Skip to main content

Security Compliance

From FedRAMP to GDPR, we’ll help you understand the security requirements of every compliance and regulatory standard. Learn how you can prove compliance.

Why you should create a security.txt file if you have a VDP or bug bounty program
Security Compliance, Vulnerability Management

What Is a Security.txt File and How Can It Help Your Program?

Security.txt is a security mechanism that allows your organization to provide its vulnerability disclosure policy and contact information in a...

Ready or Not, Here Comes GDPR
Security Compliance, Best Practices, GDPR, Compliance

Ready or Not, Here Comes GDPR

The European General Data Protection Regulation, better known as GDPR, will take effect on May 25, 2018 and it...

Key Findings From The Hacker-Powered Security Report: It’s Not Just For Tech (1 of 6)
Security Compliance, Hacker Powered Security Report

Key Findings From The Hacker-Powered Security Report: It’s Not Just For Tech (1 of 6)

When hacker-powered security is mentioned, you might assume it’s a bleeding-edge technique reserved for risk...

HackerOne’s Approach to Triage
Security Compliance, Best Practices

HackerOne’s Approach to Triage

Triage is critical to any vulnerability disclosure process or bug bounty program. Similar to triaging in a...

Bug Bounties Help Keepsafe Secure The Data of 50 Million Consumers
Security Compliance, Bounty

Bug Bounties Help Keepsafe Secure The Data of 50 Million Consumers

Keepsafe is on a mission to help us keep our private lives as they should be - private. Bug bounties are a big...

Proposed Changes to the Computer Fraud and Abuse Act, Austin Powers, and You
Security Compliance, Data and Analysis

Proposed Changes to the Computer Fraud and Abuse Act, Austin Powers, and You

Many security professionals, hackers, lawyers, law enforcement, and members of the media are keenly interested...