HackerOne

The HackerOne Blog

  • Introducing HackerOne Automations

    Introducing HackerOne Automations

    Efficiency and accuracy are crucial in vulnerability remediation. Yet, repetitive and manual handling of tasks throughout the vulnerability lifecycle remains time-consuming and prone to human...

    Read Article
  • Re-live the Security@ magic in our on-demand video library!

    Take me there!
  • The Rise of Bug Bounty Programs in S-1 Filings: A New Standard in Corporate Security

    The Rise of Bug Bounty Programs in S-1 Filings: A New Standard in Corporate Security

    Learn more about bug bounty programs and how they work >The Growing TrendAt HackerOne, we’ve observed a notable increase in companies mentioning their bug bounty programs in S-1 filings. Some of...

    Read Article
  • Announcing Hai Plays: Personalize Your Playbook for Spot-On Security Advice

    Announcing Hai Plays: Personalize Your Playbook for Spot-On Security Advice

    Take Precision to the Next Level—Beyond Basic AIEfficiency and precision are critical in every operation. However, many security teams face the challenge of repeatedly entering the same...

    Read Article
  • Hack My Career: Harley Kimball’s Journey to DEFCON

    Hack My Career: Harley Kimball’s Journey to DEFCON

    In this interview, we explore Harley's experience at DEFCON, the world’s largest hacker convention, where he took his skills to new heights. His story goes beyond technical expertise; it's about...

    Read Article
  • Capital One Launches Public Bug Bounty Program with HackerOne

    Capital One Launches Public Bug Bounty Program with HackerOne

    What's New? We at Capital One strongly believe in the importance of security, and part of our mission is to protect our customers and their data. As part of this commitment, we launched our...

    Read Article
  • From Prospect to Partner: Jon Stone Shares HackerOne Career Story

    From Prospect to Partner: Jon Stone Shares HackerOne Career Story

    At HackerOne, SDRs focus on prospecting, qualifying leads, and setting up meetings for AEs, while developing these skills to take on more responsibilities, including closing deals and managing...

    Read Article
  • Quantifying the Value of Bug Bounty Programs: ROI, ROM, or Both?

    Quantifying the Value of Bug Bounty Programs: ROI, ROM, or Both?

    HackerOne customers consistently factor in cost savings when measuring the success of their security engagements, with 59% valuing the estimated savings of reputational or customer-related...

    Read Article
  • Crushing FUD: Embracing Ethical Hackers to Strengthen Cybersecurity

    Crushing FUD: Embracing Ethical Hackers to Strengthen Cybersecurity

    What is FUD?Fear, Uncertainty, and Doubt (FUD), are central blockers to high-efficacy security programs by creating a climate of fear and hesitation, which impedes effective decision-making and...

    Read Article
  • HackerOne’s Commitment to Learning and Development

    HackerOne’s Commitment to Learning and Development

    HackerOne is committed to providing comprehensive learning and development opportunities to fuel our competitive edge and cultivate a highly skilled and deeply motivated workforce.Why Continuous...

    Read Article
  • Pentesting for iOS Mobile Applications

    Pentesting for iOS Mobile Applications

    Pentest reports are a requirement for many security compliance certifications (such as GDPR and HIPAA), and having regular pentest reports on hand can also signal to high-value customers that you...

    Read Article
  • How Hai Facilitates Clear and Effective Communication

    How Hai Facilitates Clear and Effective Communication

    The Communication Challenge in CybersecurityThe vulnerability management process involves various stakeholders, each with their own expertise and communication styles. Security teams focus on...

    Read Article
  • Retail Under Attack: 6 Learnings from a Retail Customer

    Retail Under Attack: 6 Learnings from a Retail Customer

    1. Retail and E-commerce Are Prone to Credential-based Attacks“Credential-based attacks are evergreen.”When asked what significant security threats are prevalent in the retail and -commerce...

    Read Article
  • Hack My Career: Meet Bertijn Eldering

    Hack My Career: Meet Bertijn Eldering

    Bertijn’s story is a great example of how passion, curiosity, and determination can open doors. From navigating the challenges of an internship to landing a full-time position, let’s dive into...

    Read Article
  • Takeaways from the Dismissal of Most of the Government’s Case Against the SolarWinds CISO

    Takeaways from the Dismissal of Most of the Government’s Case Against the SolarWinds CISO

    The case against SolarWinds was filed by the Securities and Exchange Commission (SEC), a government agency that has interpreted its authority broadly to regulate publicly traded companies. The...

    Read Article
  • 5 Questions to Assess Your Organization’s Bug Bounty Readiness

    5 Questions to Assess Your Organization’s Bug Bounty Readiness

    1. Are You Prepared to Manage Incoming Vulnerability Reports?Naturally, the purpose of running a bug bounty program is to identify vulnerabilities beyond what your security team can find — and...

    Read Article
  • Hack My Career: Meet Alek Relyea

    Hack My Career: Meet Alek Relyea

    Alek is a perfect example of persistence and adaptability, even without a traditional tech background, which can lead to success in the tech industry. In this blog, Alek shares his story and...

    Read Article
  • How Hai’s Report Summarization Turns Complex Data Into Actionable Insights

    How Hai’s Report Summarization Turns Complex Data Into Actionable Insights

    Enter HackerOne's AI Co-Pilot, Hai, a revolutionary tool designed to streamline this process and enhance understanding across the board.Hai is transforming how security teams handle and interpret...

    Read Article
  • Anthropic Expands Their Model Safety Bug Bounty Program

    Anthropic Expands Their Model Safety Bug Bounty Program

    Expanding Our Model Safety Bug Bounty Program The rapid progression of AI model capabilities demands an equally swift advancement in safety protocols. As we work on developing the next generation...

    Read Article
  • Tips for Parents Working from Home from HackerOne Employees

    Tips for Parents Working from Home from HackerOne Employees

    At HackerOne, we've witnessed our parents craft impressive solutions to blend their professional and personal worlds. We wanted to hear from our HackerOne parents and how they stay productive...

    Read Article
  • Security Page Updates: Boosting Consistency & Transparency for Security Researchers and Customers

    Security Page Updates: Boosting Consistency & Transparency for Security Researchers and Customers

    Cross-Directional Consistency & Transparency on the HackerOne PlatformHackerOne is a marketplace through which organizations can address security vulnerabilities with security researchers, and...

    Read Article
  • loading
    Loading More...