Image How Elastic Attracts and Retains Top Hackers Without Offering the Highest Bounties November 16th, 2021 At HackerOne’s 2021 Security@ conference , we spoke with Douglas Day, an experienced ethical hacker... Read Now
Image Exposure Management How to Use Bug Bounty Program Data to Improve Security and Development November 2nd, 2021 At HackerOne’s 2021 Security@ conference, two experienced HackerOne program managers, Allie Lugton and Denzel Duncan... Read Now
Image Exposure Management Bug Bounty vs. VDP | Which Program Is Right for You? November 4th, 2021 What Are the Key Differences Between Bug Bounty and VDPs? A VDP is a structured... Read Now
Image Exposure Management DOD's DIB-VDP Pilot Hits Six Month Milestone October 29th, 2021 Read more on this history of the DOD DIB-VDP pilot here Read Now
Image Offensive Security Crowdsourced Security Jedox’s Journey with HackerOne: A Q&A with CTO, Vladislav Maličević October 28th, 2021 *Editor's note: A security researcher is anyone who investigates a potential security issue in some... Read Now
Image Exposure Management Vulnerability Disclosure | What’s the Responsible Solution? October 28th, 2021 What Is a Vulnerability Disclosure? During a vulnerability disclosure, individuals report security weaknesses in computer... Read Now
Image Exposure Management What Is a Vulnerability Disclosure Program and Do You Need One? May 14th, 2024 Are you wondering about Vulnerability Disclosure Programs (VDPs)? Here’s why you need one, and instructions on starting one or improving your current process. Read Now
Image Exposure Management DevSecOps: How GitHub Bridges the Gap Between Security and Development March 19th, 2024 As a company that prizes security while serving tens of millions of developers worldwide, GitHub... Read Now
Image Crowdsourced Security How Trustpilot Manages Risk by Working with Ethical Hackers October 14th, 2021 Trustpilot, a cloud-first company with little physical infrastructure, relies on external security testing to ensure... Read Now
Image Exposure Management How Hackers Can Strengthen Cloud Security for Applications November 11th, 2021 What Does the Rise of Cloud Mean? According to Bressers, “It was easy to believe... Read Now