HackerOne Team

  • 5 Learnings From A Conversation With OP Financial Group's CISO And @mrtuxracer

    5 Learnings From A Conversation With OP Financial Group's CISO And @mrtuxracer

    On 20 January, HackerOne’s CEO, Marten Mickos, sat down for a chat with European hacker, Julien Ahrens a.k.a @mrtuxracer, and Teemu Ylhäisi, CISO at OP Financial Group.  Teemu Ylhäisi, CISO at OP...

    Read Article
  • LINE on Securing the Application Development Lifecycle with Bug Bounties

    LINE on Securing the Application Development Lifecycle with Bug Bounties

    Based in Japan, LINE Corporation is dedicated to the mission of “Closing the Distance,” bringing together information, services and people. The LINE messaging app launched in June 2011, offering...

    Read Article
  • Grab Celebrates 5 Years on HackerOne

    Grab Celebrates 5 Years on HackerOne

      Just five years ago, leading rideshare, food delivery, and payments company Grab, became one of the first companies in Southeast Asia to implement a hacker-powered security program. Though it...

    Read Article
  • HackerOne Policies Update

    HackerOne Policies Update

      Introduction: During November of this year, you may have noticed a new page on HackerOne: hackerone.com/policies. This page contains the Code of Conduct and other behavioral guidelines for...

    Read Article
  • The World’s Largest Live Hacking Event

    The World’s Largest Live Hacking Event

    h1-2010 Live Hacking Video Recap Thu, 12/10/2020 - 18:43 Sam Spielman How can we make...

    Read Article
  • Quantifying Risk: How do you measure success in security?

    Quantifying Risk: How do you measure success in security?

    Every quarter, a CISO has to stand up in front of their leadership and attempt to put a price on something that didn’t happen. When your job is all about avoiding costly incidents and mistakes,...

    Read Article
  • VDPs are at the Heart of the Australian Cyber Security Centre’s Recommendations

    VDPs are at the Heart of the Australian Cyber Security Centre’s Recommendations

    2020 has been an important year for VDP standardization worldwide. Earlier in the year, the U.S. saw the release of the Cybersecurity and Infrastructure Security Agency (CISA)’s Binding...

    Read Article
  • HackerOne Joins AWS Marketplace as Cloud Vulnerabilities Rise

    HackerOne Joins AWS Marketplace as Cloud Vulnerabilities Rise

    Addressing security risks at scale is more important than ever. With a global pandemic accelerating digital transformations, organizations are shipping new products and services at a faster clip,...

    Read Article
  • US Government Mandates Vulnerability Disclosure for IoT

    US Government Mandates Vulnerability Disclosure for IoT

    This year has seen a rapid acceleration in the American government’s efforts to secure federal and state cyber infrastructure. This momentum has continued with the unanimous passing of the...

    Read Article
  • Announcing new leaderboards: More ways to engage, compete and win

    Announcing new leaderboards: More ways to engage, compete and win

    Leaderboards are a fun way to measure your hacking progress and understand how you compare to the broader HackerOne community and to engage through competition. Historically, we’ve had only one...

    Read Article
  • HackerOne is Excited to Launch Triage Ratings for Customers and Hackers

    HackerOne is Excited to Launch Triage Ratings for Customers and Hackers

    For customers and hackers, the triage experience is central to hacker-powered security. Our triagers consist of a globally distributed team of security analysts that triage vulnerabilities across...

    Read Article
  • NIST Overhauls “Security and Privacy Controls” and Emphasizes VDP as a Best Practice

    NIST Overhauls “Security and Privacy Controls” and Emphasizes VDP as a Best Practice

    Back in 2005, the Computer Security Resource Center (CRSC) published NIST 800-53: the “Security and Privacy Controls for Information Systems and Organizations” publication. This Special...

    Read Article
  • Snap’s Security Team on Nearly 6 Years of Collaborating with Hackers

    Snap’s Security Team on Nearly 6 Years of Collaborating with Hackers

    As a popular camera and messaging platform, Snapchat is responsible for properly handling data for 249 million users daily. The Snap bug bounty program launched in January 2015 to encourage...

    Read Article
  • Organizations Paid Hackers $23.5 Million for These 10 Vulnerabilities in One Year

    Organizations Paid Hackers $23.5 Million for These 10 Vulnerabilities in One Year

    In times of uncertainty, security becomes an ever more pressing priority. The stakes are high: organizations are more reliant on technology than ever and anyone relying on technology can lose...

    Read Article
  • HackerOne Expands Integrations Ecosystem to Connect and Defend Customers

    HackerOne Expands Integrations Ecosystem to Connect and Defend Customers

    Revealed at Security@, HackerOne adds PagerDuty, ServiceNow, Splunk, SumoLogic to advance workflows HackerOne, the world’s most trusted hacker-powered security platform, today introduced a set of...

    Read Article
  • How Hired Builds Customer Trust With Hackerone Pentest

    How Hired Builds Customer Trust With Hackerone Pentest

    Read More
  • HackerOne Integrates with ServiceNow to Streamline Vulnerability Lifecycle Management

    HackerOne Integrates with ServiceNow to Streamline Vulnerability Lifecycle Management

    We’re excited to announce our integration with ServiceNow Incident Management. This integration allows customers to escalate vulnerability reports with ServiceNow incidents and synchronize any...

    Read Article
  • AT&T Celebrates $1 Million Awarded to Hackers in One Year

    AT&T Celebrates $1 Million Awarded to Hackers in One Year

    AT&T Communications recently celebrated its first anniversary on HackerOne, passing $1 million in payouts to more than 850 researchers worldwide. The HackerOne program is a progression from...

    Read Article
  • Introducing the 4th Annual Hacker-Powered Security Report

    Introducing the 4th Annual Hacker-Powered Security Report

    This is a time of unprecedented challenges. We face never-before- seen threats in the digital and physical worlds. If this past year has taught us anything, it is this: we need to leave behind our...

    Read Article
  • Vulnerability Disclosure is Now Mandatory for Federal Agencies - Here's How to Make it Happen

    Federal agencies exist to protect and support the nation and its citizens. Despite their elaborate processes to reduce cyber risk, many American agencies lack modern mechanisms to help identify...

    Read Article
  • loading
    Loading More...