Skip to main content

Resources

An ever growing list of resources

Towards the $50,000 Bounty
Guide

Bug Bounty Field Manual

How to Plan, Launch, and Operate a Successful Bug Bounty Program
Get the Guide
The Zenefits Bug Bounty Story
Case Study

The Zenefits Bug Bounty Story

Tips for a successful private bounty program from one of the fastest growing companies in Silicon Valley.
Download
Towards the $50,000 Bounty
Infographic

Hacking America: Cybersecurity Perception

A study on Americans’ understanding of cybersecurity and hackers.
Download
Towards the $50,000 Bounty
Case study

Towards the $50,000 Bounty

LocalTapiola upped their SDLC game with bug bounties
Learn more
How to Succeed with Your Bug Bounty Program
Guide

How to Succeed with Your Bug Bounty Program

Learn about the HackerOne Success Index - measuring bug bounty success.
Get the Guide
Shopify Shares with Hackers
Case study

Shopify Shares with Hackers

Security Education Gets Results
Download
Hack the Pentagon
Other

Hack the Pentagon

Hack the Pentagon is a bug bounty program of the US Department of Defense on the HackerOne platform.
Learn more
PullString Goes the Extra Mile
Case study

PullString Goes the Extra Mile

PullString protects kids with top-notch ToyTalk security
Download
Bug Bounty 5 years in
Guide

Bug Bounty 5 years in

Tips from launching and leading the Facebook and Uber bug bounty programs.
Get the Guide
Yahoo's Cutting Edge Approach
Case study

Yahoo's Cutting Edge Approach

How to better protect one billion users
Download
How to Run a Bug Bounty Program
Guide

How to Run a Bug Bounty Program

Best ways to make a Bug Bounty Program successful
Get the Guide
Better Security - ownCloud and HackerOne
Case study

Better Security - ownCloud and HackerOne

How ownCloud increased their security with a bug bounty program
Download
Managed Security through Collaboration - Coinbase
Case study

Managed Security through Collaboration - Coinbase

Coinbase describes their success with HackerOne and Bishop Fox.
Download
Why we use HackerOne
Video

Why we use HackerOne

HackerOne customers describe HackerOne
Watch video
Does Your CEO Know You'll Get Hacked
Video

Does Your CEO Know You'll Get Hacked

Can your company get hacked?
Watch video
HackerOne - How it Works
Video

HackerOne - How it Works

HackerOne Product Overview
Watch video
How to Team Up with Hackers
Video

How to Team Up with Hackers

Working with Hackers can improve security
Watch video
Vulnerability Coordination Maturity Model
Video

Vulnerability Coordination Maturity Model

Katie Moussouris describes the Vulnerability Coordination Maturity Model
Watch video
The New Age of Collaboration in Software Security
Video

The New Age of Collaboration in Software Security

Forward-thinking security teams collaborate to solve problems.
Watch video