Most Recent Articles
Learn more about bug bounty programs and how they work >The Growing TrendAt HackerOne, we’ve observed a notable increase in companies mentioning their bug bounty programs in S-1 filings. Some of...
Take Precision to the Next Level—Beyond Basic AIEfficiency and precision are critical in every operation. However, many security teams face the challenge of repeatedly entering the same...
In this interview, we explore Harley's experience at DEFCON, the world’s largest hacker convention, where he took his skills to new heights. His story goes beyond technical expertise; it's about...
What's New? We at Capital One strongly believe in the importance of security, and part of our mission is to protect our customers and their data. As part of this commitment, we launched our...
At HackerOne, SDRs focus on prospecting, qualifying leads, and setting up meetings for AEs, while developing these skills to take on more responsibilities, including closing deals and managing...
HackerOne customers consistently factor in cost savings when measuring the success of their security engagements, with 59% valuing the estimated savings of reputational or customer-related...
What is FUD?Fear, Uncertainty, and Doubt (FUD), are central blockers to high-efficacy security programs by creating a climate of fear and hesitation, which impedes effective decision-making and...
HackerOne is committed to providing comprehensive learning and development opportunities to fuel our competitive edge and cultivate a highly skilled and deeply motivated workforce.Why Continuous...
Pentest reports are a requirement for many security compliance certifications (such as GDPR and HIPAA), and having regular pentest reports on hand can also signal to high-value customers that you...
The Communication Challenge in CybersecurityThe vulnerability management process involves various stakeholders, each with their own expertise and communication styles. Security teams focus on...
1. Retail and E-commerce Are Prone to Credential-based Attacks“Credential-based attacks are evergreen.”When asked what significant security threats are prevalent in the retail and -commerce...
Bertijn’s story is a great example of how passion, curiosity, and determination can open doors. From navigating the challenges of an internship to landing a full-time position, let’s dive into...
The case against SolarWinds was filed by the Securities and Exchange Commission (SEC), a government agency that has interpreted its authority broadly to regulate publicly traded companies. The...
1. Are You Prepared to Manage Incoming Vulnerability Reports?Naturally, the purpose of running a bug bounty program is to identify vulnerabilities beyond what your security team can find — and...
Alek is a perfect example of persistence and adaptability, even without a traditional tech background, which can lead to success in the tech industry. In this blog, Alek shares his story and...
Enter HackerOne's AI Co-Pilot, Hai, a revolutionary tool designed to streamline this process and enhance understanding across the board.Hai is transforming how security teams handle and interpret...
Expanding Our Model Safety Bug Bounty Program The rapid progression of AI model capabilities demands an equally swift advancement in safety protocols. As we work on developing the next generation...
At HackerOne, we've witnessed our parents craft impressive solutions to blend their professional and personal worlds. We wanted to hear from our HackerOne parents and how they stay productive...
Cross-Directional Consistency & Transparency on the HackerOne PlatformHackerOne is a marketplace through which organizations can address security vulnerabilities with security researchers, and...
Our Solution: Precision Internal Network Testing with Zero Trust ControlWe are excited to introduce Gateway Internal Network Testing (INT) as the latest enhancement to HackerOne Gateway, powered...