Image AlienVault streamlines their vulnerability disclosure with HackerOne Response December 12th, 2017 Like many organizations, AlienVault had set up a vulnerability disclosure policy for any bugs found... Read Now
Image Why Riot Games Pays Hackers to Break Them December 4th, 2017 In the League of Legends world, your nexus is protected from outside threats by a... Read Now
Image KPMG’s Cyber Security Expert Offers Advice for Bug Bounty Success December 1st, 2017 Before you propose a bug bounty program to your organization, you need a comprehensive plan... Read Now
Image The ICO’s 12-Step Guide to GDPR Compliance November 30th, 2017 When the European General Data Protection Regulation (GDPR) takes effect on May 25, 2018, every... Read Now
Image Breach Basics: Preparation for the Inevitable November 28th, 2017 Data breaches in information security have become an inescapable reality. A common inquiry we receive... Read Now
Image The Voices of Vulnerability Disclosure: Look Who’s Talking About VDPs November 22nd, 2017 The attention being given to vulnerability disclosure policies (VDP) in the past year has increased... Read Now
Image H1-212 CTF results November 21st, 2017 Hello hackers! Thanks to all of you who participated in our first ever h1-212 CTF... Read Now
Image Hack your way to NYC this December for h1-212 November 13th, 2017 Want to win an all expenses paid trip to New York City to hack against... Read Now
Image Hack The Pentagon Turns One on HackerOne November 9th, 2017 Great news for U.S. citizens! Over 3,000 valid security vulnerabilities have been resolved with the... Read Now
Image Hacker-Powered Pen Tests and The Power of More November 8th, 2017 Traditional penetration testing is an important tool in your appsec strategy toolbox. Compliance requires it... Read Now