HackerOne
The HackerOne Blog
-
Introducing HackerOne Automations
Efficiency and accuracy are crucial in vulnerability remediation. Yet, repetitive and manual handling of tasks throughout the vulnerability lifecycle remains time-consuming and prone to human...
-
Re-live the Security@ magic in our on-demand video library!
Take me there! -
The Rise of Bug Bounty Programs in S-1 Filings: A New Standard in Corporate Security
Learn more about bug bounty programs and how they work >The Growing TrendAt HackerOne, we’ve observed a notable increase in companies mentioning their bug bounty programs in S-1 filings. Some of...
-
Announcing Hai Plays: Personalize Your Playbook for Spot-On Security Advice
Take Precision to the Next Level—Beyond Basic AIEfficiency and precision are critical in every operation. However, many security teams face the challenge of repeatedly entering the same...
-
Hack My Career: Harley Kimball’s Journey to DEFCON
In this interview, we explore Harley's experience at DEFCON, the world’s largest hacker convention, where he took his skills to new heights. His story goes beyond technical expertise; it's about...
-
Capital One Launches Public Bug Bounty Program with HackerOne
What's New? We at Capital One strongly believe in the importance of security, and part of our mission is to protect our customers and their data. As part of this commitment, we launched our...
-
From Prospect to Partner: Jon Stone Shares HackerOne Career Story
At HackerOne, SDRs focus on prospecting, qualifying leads, and setting up meetings for AEs, while developing these skills to take on more responsibilities, including closing deals and managing...
-
Quantifying the Value of Bug Bounty Programs: ROI, ROM, or Both?
HackerOne customers consistently factor in cost savings when measuring the success of their security engagements, with 59% valuing the estimated savings of reputational or customer-related...
-
Crushing FUD: Embracing Ethical Hackers to Strengthen Cybersecurity
What is FUD?Fear, Uncertainty, and Doubt (FUD), are central blockers to high-efficacy security programs by creating a climate of fear and hesitation, which impedes effective decision-making and...
-
HackerOne’s Commitment to Learning and Development
HackerOne is committed to providing comprehensive learning and development opportunities to fuel our competitive edge and cultivate a highly skilled and deeply motivated workforce.Why Continuous...
-
Pentesting for iOS Mobile Applications
Pentest reports are a requirement for many security compliance certifications (such as GDPR and HIPAA), and having regular pentest reports on hand can also signal to high-value customers that you...
-
How Hai Facilitates Clear and Effective Communication
The Communication Challenge in CybersecurityThe vulnerability management process involves various stakeholders, each with their own expertise and communication styles. Security teams focus on...
-
Retail Under Attack: 6 Learnings from a Retail Customer
1. Retail and E-commerce Are Prone to Credential-based Attacks“Credential-based attacks are evergreen.”When asked what significant security threats are prevalent in the retail and -commerce...
-
Hack My Career: Meet Bertijn Eldering
Bertijn’s story is a great example of how passion, curiosity, and determination can open doors. From navigating the challenges of an internship to landing a full-time position, let’s dive into...
-
Takeaways from the Dismissal of Most of the Government’s Case Against the SolarWinds CISO
The case against SolarWinds was filed by the Securities and Exchange Commission (SEC), a government agency that has interpreted its authority broadly to regulate publicly traded companies. The...
-
5 Questions to Assess Your Organization’s Bug Bounty Readiness
1. Are You Prepared to Manage Incoming Vulnerability Reports?Naturally, the purpose of running a bug bounty program is to identify vulnerabilities beyond what your security team can find — and...
-
Hack My Career: Meet Alek Relyea
Alek is a perfect example of persistence and adaptability, even without a traditional tech background, which can lead to success in the tech industry. In this blog, Alek shares his story and...
-
How Hai’s Report Summarization Turns Complex Data Into Actionable Insights
Enter HackerOne's AI Co-Pilot, Hai, a revolutionary tool designed to streamline this process and enhance understanding across the board.Hai is transforming how security teams handle and interpret...
-
Anthropic Expands Their Model Safety Bug Bounty Program
Expanding Our Model Safety Bug Bounty Program The rapid progression of AI model capabilities demands an equally swift advancement in safety protocols. As we work on developing the next generation...
-
Tips for Parents Working from Home from HackerOne Employees
At HackerOne, we've witnessed our parents craft impressive solutions to blend their professional and personal worlds. We wanted to hear from our HackerOne parents and how they stay productive...
-
Security Page Updates: Boosting Consistency & Transparency for Security Researchers and Customers
Cross-Directional Consistency & Transparency on the HackerOne PlatformHackerOne is a marketplace through which organizations can address security vulnerabilities with security researchers, and...
- Loading More...