Image The AWS Shared Responsibility Model: 3 Areas of Improvement to Make Today, Part 1 September 12th, 2018 Migrating your digital assets to the cloud can seem overwhelming at times. But you’re not... Read Now
Image Introducing the Hacker101 CTF September 10th, 2018 Hacker101 is getting something brand new: our own Capture The Flag! For those who are... Read Now
Image Highlights of New York’s Cybersecurity Regulation 23 NYCRR Part 500 September 4th, 2018 September 4, 2018 - Eighteen month transitional period ends. Covered Entities are required to be... Read Now
Image Hacker Q&A with Matthew Bryant: Good Artists Copy, Great Artists Steal August 31st, 2018 “Seeing an exploit without understanding how any of it works felt like witnessing someone doing... Read Now
Image What is a Responsible Disclosure Policy and Why You Need One August 30th, 2018 Bug bounty programs may capture the majority of headlines in hacker-powered security today, but organizations... Read Now
Image 7 Common Security Pitfalls to Avoid When Migrating to the Cloud August 27th, 2018 So you want to move to the cloud. It’s okay. You’re not alone. 96 percent... Read Now
Image 118 Fascinating Facts from HackerOne’s Hacker-Powered Security Report 2018 August 27th, 2018 Another year, another Hacker-Powered Security Report! We pulled out 100 of the report’s top facts—and... Read Now
Image Oath Bug Bounty Program Update: $1M in payouts and expansion of the program August 23rd, 2018 This blog was written by Oath CISO and Paranoid in Chief Chris Nims and originally... Read Now
Image Improve Credential Sharing with Hacker Email Aliases August 16th, 2018 Starting today, all existing and new hackers get a personalized email alias tied to their... Read Now
Image Software Vulnerability Disclosure in Europe: Summary and Key Highlights of the European Parliament CEPS Task Force Report August 14th, 2018 In the autumn of 2017, the Centre for European Policy Studies (CEPS), a European Union... Read Now