HackerOne

The HackerOne Blog

  • Sales Development Representatives Win as a Team

    Sales Development Representatives Win as a Team

    In the following interview, Jessica discusses how she embodies HackerOne’s Win as a Team company value to drive her team's success.What does Win as a Team mean to you?To me, winning as a team is...

    Read Article
  • Re-live the Security@ magic in our on-demand video library!

    Take me there!
  • Community-driven PTaaS vs. Traditional Pentesting

    Community-driven PTaaS vs. Traditional Pentesting

    Modern pentesting approaches use independent security researchers working under strict NDAs and advanced software platforms to streamline the process. However, with many vendors focusing on other...

    Read Article
  • What HackerOne Customers Can Tell You About Securing Organizational Buy-In for Ethical Hackers

    What HackerOne Customers Can Tell You About Securing Organizational Buy-In for Ethical Hackers

    Securing Organizational Buy-in For Ethical HackersCISOs and other security leaders are challenged to demonstrate the benefits of working with ethical hackers and secure budget and buy-in for their...

    Read Article
  • From Zero to Hero:  Your Guide to Building a Bug Bounty Program With HackerOne

    From Zero to Hero: Your Guide to Building a Bug Bounty Program With HackerOne

    Jump to a section:What is a bug bounty program?Benefits of a bug bounty programKey elements for a successful bug bounty programNavigating common challenges in bug bounty programsInvolving your...

    Read Article
  • HackerOne Company Values Matter: Execute with Excellence

    HackerOne Company Values Matter: Execute with Excellence

    Since its inception, the Execute with Excellence Award has had three remarkable recipients. Each one shares a unique perspective on what this award and HackerOne's values mean to them.Meet...

    Read Article
  • NIST CSF 2.0 and Pentesting: What You Need to Know

    NIST CSF 2.0 and Pentesting: What You Need to Know

    In 2014, the National Institute of Standards and Technology (NIST), recognizing the importance of protecting U.S. systems and data against cyberattack, issued its CyberSecurity Framework (CSF). ...

    Read Article
  • Hack My Career: Advice from HackerOne Employees

    Hack My Career: Advice from HackerOne Employees

    Today, we gathered insights from five HackerOne employees offering career advice to illuminate this journey and provide guidance.Kayla Underkoffler, Senior Security Technologist in Pennsylvania,...

    Read Article
  • HackerOne's List of Top 10 AI EMB(arrassments)

    HackerOne's List of Top 10 AI EMB(arrassments)

    Unlike traditional security flaws, which typically result in data breaches or service disruptions, AI systems can also cause embarrassment through errors in judgment, biased decision-making, or...

    Read Article
  • 3 Bug Bounty Lessons From Retail & eCommerce Customers

    3 Bug Bounty Lessons From Retail & eCommerce Customers

    How do security vulnerabilities uniquely impact the retail and eCommerce space, and how can retail and eCommerce organizations use ethical hackers to mitigate risk? We spoke with several HackerOne...

    Read Article
  • GDPR and Pentesting: What You Need to Know

    GDPR and Pentesting: What You Need to Know

    Personal data, also referred to as PII (personally identifiable information) is any piece of data or information that can be used to identify a person. A few examples of personal data are:...

    Read Article
  • 5 Bug Bounty Insights From SIX Group

    5 Bug Bounty Insights From SIX Group

    1. Why VDP and Bug Bounty?At SIX Group, Alex Hagenah emphasized the year-round success of going beyond the regulatory requirements of the financial services industry.“We’re a highly regulated...

    Read Article
  • Embracing Resilience: HackerOne's Approach to Disaster Recovery

    Embracing Resilience: HackerOne's Approach to Disaster Recovery

    So, What Is Disaster Recovery?In the dynamic world of tech, things can break – sometimes due to our actions, but it can also be due to external factors like provider outages. That's where Disaster...

    Read Article
  • HackerOne Applauds Senator Warner’s Support for Legal Protection of AI Red Teaming

    HackerOne applauds Senator Mark Warner’s support for expanding protections for good-faith AI research under the Digital Millennium Copyright Act (DMCA) Section 1201. HackerOne has pointed out that...

    Read Article
  • HackerOne Spot Checks for On-Demand, Targeted Security Testing

    HackerOne Spot Checks for On-Demand, Targeted Security Testing

    Should teams prioritize conducting thorough security checks or accelerating product timelines? Striking a balance between these competing priorities is essential, as overlooking security measures...

    Read Article
  • HackerOne's Cloud Security Capabilities for AWS Customers 

    HackerOne's Cloud Security Capabilities for AWS Customers 

    HackerOne provides security capabilities for AWS customers looking to improve security in their cloud applications. These include vulnerability pentests specific to AWS environments, an AWS...

    Read Article
  • AI Developers’ AMA: AI System Design and Development

    AI Developers’ AMA: AI System Design and Development

    During our recent webinar, Beyond the Algorithm: AI Developers’ Ask-Me-Anything, four seasoned AI engineers discussed details and questions about applied AI and machine learning (ML). They focused...

    Read Article
  • What You Need to Know About the EU’s Cyber Resilience Act

    What You Need to Know About the EU’s Cyber Resilience Act

    The CRA Introduces Mandatory Cybersecurity RequirementsThe European CRA creates mandatory cybersecurity requirements for hardware and software with digital elements. The Act’s reach is broad,...

    Read Article
  • Security@: The Top 3 Bug Bounty Lessons From Security Leaders

    Security@: The Top 3 Bug Bounty Lessons From Security Leaders

    HackerOne’s Security@ conferences are exclusive events that bring together customers, hackers, and industry experts to share opinions and advice about building resilient security programs.Security...

    Read Article
  • How a Business Logic Vulnerability Led to Unlimited Discount Redemption

    How a Business Logic Vulnerability Led to Unlimited Discount Redemption

    It sounds straightforward enough, but business logic vulnerabilities can result in an array of serious security issues, such as unauthorized access, bypassing rate limits, or in the case of a...

    Read Article
  • How Hackers Help Jedox Secure Cloud Assets and Stay One Step Ahead

    How Hackers Help Jedox Secure Cloud Assets and Stay One Step Ahead

    Jedox was recently named a Leader in the Gartner Magic Quadrant for Financial Planning Software. One criterion related to being named to the Leader quadrant is how mature an organization is when...

    Read Article
  • loading
    Loading More...