Image Sumo Logic Looks to Hacker-Powered Pen Testing for Security and Compliance July 31, 2018 Secrecy has been a trademark of security culture for decades. Companies like cloud-based log management... Read Now
Image Zomato’s First Anniversary with Bug Bounties: Q&A with Security Lead, Prateek Tiwari July 23, 2018 Headquartered in India - restaurant discovery, online ordering and table reservations platform Zomato currently operates... Read Now
Image The Hacker-Powered Security Report 2018 July 11, 2018 "Crowdsourced security testing is rapidly approaching critical mass, and ongoing adoption and uptake by buyers... Read Now
Image H1-702 CTF Winners Announced! July 9, 2018 Thanks to all the hackers who participated in the h1-702 2018 CTF! For the first... Read Now
Image Lawfully Hacked July 9, 2018 The best way to prevent getting hacked is to try to get hacked. Paradoxical as... Read Now
Image The Journey to 100% Responsive Programs July 5, 2018 Hackers, we hear you. Unresponsive programs are a drain on your time and your sanity... Read Now
Image Webinar: Learn How Hacker-Powered Pentests Give You More For Less July 3, 2018 Penetration tests are a fundamental part of any security apparatus, but they’re traditionally seen as... Read Now
Image Morrison & Foerster’s David Newman: How Corporate Counsel Should Approach Hacker-Powered Security July 2, 2018 The law firm of Morrison & Foerster has been providing cutting-edge legal advice on matters... Read Now
Image Hackers Descend on London for First Ever UK Live Hacking Event: H1-4420 June 28, 2018 On Saturday, June 16, almost 50 hackers gathered from across the world to hack one... Read Now
Image Advanced triggers feature launches to further improve signal June 21, 2018 Receiving invalid or unwanted reports to your bug bounty program is never desirable. These reports... Read Now