Skip to main content
Notification Message
Hai Agentic - Smarter AI for Faster Risk Reduction |
Learn More

User account menu

  • Login
  • Leaderboard
  • Contacted by a hacker?

Home

Main navigation

  • Platform
    • Bug Bounty

      Continuous Researcher-led Testing

    • Pentest as a Service

      Programmatic, On-demand Pentests

    • Response

      Vulnerability Disclosure Program (VDP)

    • Challenge

      Time-bound Offensive Testing

    • AI Red Teaming

      Testing AI for Safety & Security

    • Code

      Expert Code Review and Guidance

    • Platform Overview
    • Why HackerOne
    • Hai Agentic AI
    • Data and Analytics
    • Hai Triage
    • Live Hacking Events
    • Integrations
    • Services
    • Researcher Community
  • Solutions
    • Use Cases
    • Adversarial Exposure Validation
    • AI Security, Safety & Trust
    • Application Security
    • Cloud Security
    • Continuous Security Testing
    • Continuous Vulnerability Discovery
    • Crowdsourced Security
    • CTEM
    • Vulnerability Management
    • Web3
    • Industries
    • Automotive & Transportation
    • Crypto & Blockchain
    • Financial Services
    • Public Sector
    • Healthcare
    • Retail & E-Commerce
    • Hospitality & Entertainment
    • US Federal
    • UK Government
    • Heading
      The Future of AI
      Sub Heading
      A Security Guide
      CTA Component
      Download now
  • Partners
    • Partner Overview
    • Technology Alliance
    • Hackerone and AWS
    • Find A Channel Partner
    • Partner Portal
    • Integration Partners
  • Researchers
    • HackerOne for Hackers
    • Learn to hack
    • Ambassador World Cup
    • Opportunities
    • Leaderboard
    • Researcher Community
  • Resources
    • Heading
      Research Report
      Sub Heading
      Benchmarks & insights from 500K vulnerability reports.
      CTA Component
      Download the Report
    • Events
    • Event Calendar
    • Live Hacking Events
    • Ambassador World Cup
    • Learn
    • Blog
    • Resource Center
    • Customer Stories
    • Vulnerability Disclosure Policy Map
    • Platform Documentation
  • Company
    • Company Overview
    • Why HackerOne
    • Leadership
    • Careers
    • Security & Trust
    • Public Policy
    • Newsroom
Get Started
Home
HackerOne

Main navigation

  • Platform
  • Platform
    • Bug Bounty

      Continuous Researcher-led Testing

    • Pentest as a Service

      Programmatic, On-demand Pentests

    • Response

      Vulnerability Disclosure Program (VDP)

    • Challenge

      Time-bound Offensive Testing

    • AI Red Teaming

      Testing AI for Safety & Security

    • Code

      Expert Code Review and Guidance

    • Platform Overview
    • Why HackerOne
    • Hai Agentic AI
    • Data and Analytics
    • Hai Triage
    • Live Hacking Events
    • Integrations
    • Services
    • Researcher Community
  • Solutions
  • Solutions
    • Use Cases
    • Adversarial Exposure Validation
    • AI Security, Safety & Trust
    • Application Security
    • Cloud Security
    • Continuous Security Testing
    • Continuous Vulnerability Discovery
    • Crowdsourced Security
    • CTEM
    • Vulnerability Management
    • Web3
    • Industries
    • Automotive & Transportation
    • Crypto & Blockchain
    • Financial Services
    • Public Sector
    • Healthcare
    • Retail & E-Commerce
    • Hospitality & Entertainment
    • US Federal
    • UK Government
    • Heading
      The Future of AI
      Sub Heading
      A Security Guide
      CTA Component
      Download now
  • Partners
  • Partners
    • Partner Overview
    • Technology Alliance
    • Hackerone and AWS
    • Find A Channel Partner
    • Partner Portal
    • Integration Partners
  • Researchers
  • Researchers
    • HackerOne for Hackers
    • Learn to hack
    • Ambassador World Cup
    • Opportunities
    • Leaderboard
    • Researcher Community
  • Resources
  • Resources
    • Heading
      Research Report
      Sub Heading
      Benchmarks & insights from 500K vulnerability reports.
      CTA Component
      Download the Report
    • Events
    • Event Calendar
    • Live Hacking Events
    • Ambassador World Cup
    • Learn
    • Blog
    • Resource Center
    • Customer Stories
    • Vulnerability Disclosure Policy Map
    • Platform Documentation
  • Company
  • Company
    • Company Overview
    • Why HackerOne
    • Leadership
    • Careers
    • Security & Trust
    • Public Policy
    • Newsroom
  • Get Started
  • Login

New CISA framework offers improved hardware supply chain risk assessments

New CISA framework offers improved hardware supply chain risk assessments

September 26th, 2023
SiliconAngle
https://siliconangle.com/2023/09/26/new-cisa-hbom-framework-offers-improved-har…

Better hardware supply chain risk evaluations sought by new CISA framework

Better hardware supply chain risk evaluations sought by new CISA framework

September 27th, 2023
SC Magazine
https://www.scmagazine.com/brief/better-hardware-supply-chain-risk-evaluations-…

CISA releases HBOM framework for supply chain risk management

CISA releases HBOM framework for supply chain risk management

September 27th, 2023
Security Magazine
https://www.securitymagazine.com/articles/99944-cisa-releases-hbom-framework-fo…
Image
2022 NA EPD Team
About the HackerOne Engineering Mentoring Program
September 27th, 2023
The program began in 2021 as an internal resource for engineers to be mentors and...
Read Now
Image
Joy + Kaylee at ClubOne
Women in Sales: The Importance of a Diverse Team
September 26th, 2023
Earlier this year, I was part of a HackerOne team that developed the Women in...
Read Now
Image
The HackerOnesie
What is the HackerOnesie?
September 26th, 2023
The HackerOnesie instantly became famous the day it was introduced in 2017. Although it has...
Read Now
Image
Cybersecurity Needs Hackers
Why This Moment In Cybersecurity Needs Hackers To Protect All Software
September 21st, 2023
Companies that don't make use of hackers are putting themselves at higher risk.
Read Now
Image
Code showing LLM vulnerabilities
Exposure Management
HackerOne and the OWASP Top 10 for LLM: A Powerful Alliance for Secure AI
August 7th, 2023
Here is HackerOne’s perspective on the Top 10 list for LLM vulnerabilities and how organizations can prevent these critical security risks.
Read Now
Image
HackerOne Blog Logo
Company Update
August 2nd, 2023
Update on HackerOne company news from HackerOne CEO, Marten Mickos
Read Now
Image
Amazon's Security Researcher
Crowdsourced Security
Amazon's Security Researcher Collaboration: Highlights from H1-213
July 25th, 2023
Read Now

Pagination

  • First page
  • Previous page
  • …
  • Page 38
  • Page 39
  • Page 40
  • Page 41
  • Page 42
  • Page 43
  • Page 44
  • Page 45
  • Page 46
  • …
  • Next page
  • Last page
Home
Contacted by a hacker?
Menu 1
Company
Leadership
Careers
Partners
Newsroom
Contact Us
Menu 2
Knowledge Center
Application Security
Penetration Testing
AI Red Teaming
Hacking
Cybersecurity Attacks
CTEM
Menu 3
Resources
Blog
Documentation
Leaderboard
Partner Portal
Resources
Facebook
X
Linkedin
Instagram

Menu Bottom
Policies
Terms
Privacy
Security
Trust
Right Reserved
©2025 HackerOne All rights reserved.