Error - something went wrong!
In the autumn of 2017, the Centre for European Policy Studies (CEPS), a European Union think tank, initiate...
A guide for making meaningful progress on improving your security posture
Security teams are challenged by the radical shifts in software development, from the fast pace and frequent releases to new languages and modern models. In that whirlwind, CISOs still have to...
To produce their recent report “The Total Economic Impact Of HackerOne Challenge: Improved Security And Compliance”, Forrester Consulting interviewed customers that switched to HackerOne...
Bug Bounties have become rather popular lately. So have common misconceptions. We’re here to set the record straight. We sat down with Laurie Mercer, a security engineer at HackerOne, to tackle...
Cybercriminals aren’t bound by borders, resulting in nearly $600 billion in losses every year. Hackers are your best defense against risks.
This three-part series answers all your questions on VDP best practices.
12-page booklet providing advice for creating a vulnerability disclosure page - along with great quotes about why this matters.
Specific to Finserv on details needed to implement a complete and compliant policy. Takes the VDP guide and updates with finserv intro and Goldman Sachs policy example
17-page booklet that highlights how hacker-powered security can work alongside established security efforts.
Secure from the Start: The Complete Guide for Entrepreneurs summarizes the key security topics that every technology entrepreneur needs to understand.
Vulnerability data and hacker-powered security adoption metrics for the financial services industry.
Improving application security by incorporating bug bounties and crowdsourced pen tests into DevOps pipeline.
In this list, you’ll see which programs on the HackerOne platform ranked highest on the total amount of bounties awarded to hackers over the life of the program.
12-page booklet that defines the most common security pitfalls when migrating to the cloud and how to prevent security regression.