Report

The Hacker-Powered Security Report 2018

The study on the hacker-powered security ecosystem

All Resources

Case Studies

Guides

Reports

Webinars

Videos

Infographics

Guide
In this exhaustive guide, you’ll learn: How you can easily and quickly add hacker-powered security in a step-by-step process...
Webinar
Join financial services veteran, Jason Pubal, for this informative webinar on bug bounty implementation for financial services firms. Jason will review how in an agile and devops world, bug bounty programs help align information security with the new pace of product development and enhance a penetration testing program to be more focused and valuable. 
Report
Get to know the HackerOne community of hackers and see details of the HackerOne platform and approach.
Guide
Hacker-powered security checks off each of those boxes for growth-stage startups. It’s a cost-effective means for reducing risk and improving security, while also enabling engineering scalability and efficiency.
Guide
No one migrates to the cloud to become less secure than before the migration. Read on to learn how to prevent such a security regression when migrating to the cloud.
Report
Vulnerability data and hacker-powered security adoption metrics for the financial services industry
Guide
VDPs protect companies and hackers. That’s why the U.S. Department of Justice, the European Commission, and the U.S. Food & Drug Administration recommend them.
Guide
Summary and Key Highlights of the European Parliament CEPS Task Force Report
Case Study
When customers trust you to store and manage their data in the cloud, and regulatory agencies are watching, you need more than just the traditional approach to security.
Case Study
Connecting eaters with restaurants is Zomato’s main business, so they took a hospitable approach to hackers, driving engagement and quality submissions vital to the security of Zomato’s customers and core business applications.
Webinar
Fireside Chat between Marten Mickos - HackerOne CEO and Luke Tucker, Director Content & Community, HackerOne
Case Study
Read how Nextcloud uses HackerOne to expand their security efforts while maintaining a tight budget and keeping up with speedy competitors
Case Study
Over the past 3 years, Salesforce has worked with HackerOne to accept thousands of bug reports and award bounties to more than 1,200 hackers. The results are nothing short of a resounding success.
Report
More than 40 of the top blockchain and cryptocurrency companies trust HackerOne and our community of white-hat hackers to strengthen their security and protect their users.
Report
The study on the hacker-powered security ecosystem
Guide
Read the e-book to get all the details you need to implement a complete and compliant policy. 
Infographic
HackerOne Challenge customers—from the U.S. Department of Defense and the U.S. Air Force, to GitHub to Airbnb—and 100’s more customers are embracing the hacker-powered approach to increase the value they receive from point-in-time security tests. Here’s what they had to say in their own words.
Video
Reina is with the Defense Digital Service, as part of the larger US Digital Service; those responsible for Hack the Pentagon.
Guide
What the Federal Trade Commission learned from more than 50 law enforcement actions related to data security
Guide
Don’t just check the box on your annual pen test regimen but get useful results to improve your overall security.
Report
General Motors, Toyota, Auto-ISAC, and others are setting the cybersecurity pace for the entire automotive industry to follow.
Guide
What's it like testifying in front of congress after a massive breach?
Video
HackerOne CEO Marten Mickos joins NBC anchor and reporter Scott McGrew, Gizmodo's Kate Conger, and Reuters' Heather Somerville to discuss bug bounties and the latest Hack the Department of Homeland Security Bill (HR 1281)
Case Study
Read about GM’s success of working with HackerOne and the white hat hacker community
Guide
CISO's look to Thomas for getting their GDPR questions answered. Read the full interview with Thomas as he addresses some key concerns on this hot topic
Case Study
Qualcomm's Alex Gantman shares advice and best practices on working with security researchers and running a bug bounty program
Case Study
Shopify uses bug bounties to safeguard their merchants and turn the tables on vulnerabilities...and criminals.
Report
Read HackerOne Co-Founder and CTO Alex Rice’s summary of the hearing testimony, a full transcript of the hearing testimony of HackerOne CEO, Mårten Mickos, and also included are responses to follow up questions from U.S. Senator Jerry Moran of Kansas.
Webinar
Privacy expert and DPO consultant Debra Farber presents on the GDPR requirements for the Data Protection Officer
Guide
HackerOne provides several layers of control for selecting, inviting, and approving hackers based on their Reputation metrics, past program participation, specific skills, and more. Read how it works.
Case Study
Government agencies such as the US DoD, EU Commission, Singapore MINDEF and others, trust HackerOne to manage their hacker-powered security programs. Read their success stories.
Infographic
Flashcards formatted for easy printing and sharing
Infographic
In the past 5 years, our community of hackers has earned more than $24 million in bounties—and they’re on track to earn $100 million by the end of 2020. But we’ve often wondered: what are they doing with all of that money?
Guide
See data from HackerOne platform and interview with CISO of the year, Leo Niemela
Report
The largest survey ever conducted of the ethical hacking community. See statistics and growth metrics, insights into hacker motivations and mindset, and hacker stories.
Case Study
Read how Yelp transitioned from a private bug bounty program to a public bug bounty program and their learnings and statistics
Case Study
More than 25% of websites are powered by WordPress. Learn about their security team's approach to bug bounties
Case Study
Read about the strategies Riot Games employs in their successful bug bounty program which has paid out over $1M to hackers. Teaser: respect the hackers!
Case Study
Read how the security team at Mapbox have grown from a simple vulnerability disclosure policy to a robust and competitive bug bounty program. Written by Alex Ulsh from Mapbox.
Case Study
Coinbase is the most popular way to buy and sell cryptocurrencies. Read how they increased their bounties and secure their platform with HackerOne.
Case Study
HackerOne Response is helping AlienVault manage incoming reports, triage them, and automatically create tickets on their internal ticketing system. Read how.
Guide
Why thinking like a hacker is good for business
Guide
How you can protect your code, key GDPR articles you need to read, and your plan for when vulnerabilities are discovered by third parties
Guide
A flash card reference guide to the 10 most critical web security risks of 2017
Guide
Guidance on how to most effectively respond to a breach.
Guide
See a side-by-side comparison chart of traditional pen tests and hacker-powered pen tests.
Webinar
HackerOne welcomes Allen D. Householder and Art Manion, co-authors of the 121 page CERT® Guide to Coordinated Vulnerability Disclosure, for an Ask Me Anything session around their research and thoughts on vulnerability disclosure.
Guide
We distilled the 121-page CERT Guide to Coordinated Vulnerability Disclosure into a handy cliff notes version for easy reference
Guide
16 quotes from business and government leaders on why you need a vulnerability disclosure policy in place today to avoid being Equifax tomorrow
Guide
Recommendations from The United Kingdom's Information Commissioner's Office (ICO) to Prepare for May 2018
Guide
See how Hacker-Powered Pen Tests deliver 10x the results at a fraction of the cost of traditional penetration tests
Infographic
Infographic showing how bug bounties are an invaluable tool for a secure SDLC.
Report
Our deep dive into vulnerabilities and programs for the financial services industry with new data and insights
Case Study
The U.S. Department of Defense (DoD), in a first for the U.S. Federal Government, invited white hat hackers to find security flaws in systems run by the Pentagon, Air Force, and Army.
Infographic
See some of the top companies running successful bug bounty programs on HackerOne.
Webinar
Watch this webinar to learn how to get around misguided thinking that leads to executive under investment in cyber security, and secure the resources you need.
Report
Specifically focused on the ecommerce and retail industry, this report covers data and insights from 800+ bug bounty programs.
Webinar
Scott Crawford, Research Director of Information Security at 451 Research, shares: Why having a Vulnerability Disclosure Policy is now “table stakes” and how bug bounties fit into the secure software development lifecycle
Guide
Download Vulnerability Disclosure Policy (VDP) Basics -- A complete guide for crafting an effective Vulnerability Disclosure Policy.
Infographic
A vulnerability disclosure policy (VDP) gives ethical hackers clear guidelines for reporting potentially unknown and harmful security vulnerabilities.
Guide
Get the TL;DR on 451 Research’s latest “pathfinder report” advising decision-makers on the value of bug bounties and the importance of a compliant vulnerability disclosure process.
Infographic
For your quick reference, we’ve distilled the report to 5 key trends that show how white-hat hackers are shaping the world of security.
Report
All the data from the HackerOne Hacker-Powered Security Report 2017
Guide
451 Research explores the role of bug bounties and vulnerability disclosure in the secure SDLC
Case Study
How to ensure security of the sensitive financial data for over 10,000 small and medium businesses? Run a top-tier bug bounty program.
Webinar
GitLab’s Product Manager, Victor Wu, dives into how GitLab helps you ship secure code, the tools they use, and a few industry best practices they follow to protect data and secrets.
Webinar
Creating secure software at the speed of agile: Your SDLC is incomplete without Hacker-powered security with Assembla CTO, Jacek Materna.
Report
A comprehensive report by HackerOne on data and insights from 800+ bug bounty programs and 50,000 resolved security vulnerabilities
Case Study
Learn how hacker-powered security illuminated their security blind spots.
Report
Who are these bug bounty hackers?
Guide
The Visual Guide for how to Plan, Launch, and Operate a Successful Bug Bounty Program
Guide
The definitive guide on how to plan, launch, and operate a successful bug bounty program.
Infographic
A study on Americans’ understanding of cybersecurity and hackers.
Case Study
LocalTapiola upped their SDLC game with bug bounties
Guide
Learn about the HackerOne Success Index - measuring bug bounty success.
Guide
Tips from launching and leading the Facebook and Uber bug bounty programs.
Guide
Best ways to make a Bug Bounty Program successful
Video
HackerOne customers describe HackerOne
Video
Can your company get hacked?
Video
HackerOne Product Overview
Video
Working with Hackers can improve security
Video
Katie Moussouris describes the Vulnerability Coordination Maturity Model
Video
Forward-thinking security teams collaborate to solve problems.

Contact Us

Request a Demo