Skip to main content

HackerOne Blog

Read the HackerOne blog to learn strategies for strengthening your attack resistance with help from highly skilled ethical hackers. Improve your security profile and stay up to date on industry trends and emerging threats.

Level Up Your Bug Bounty Effectiveness, Part II: Operational Areas to Continuously Improve
Vulnerability Management

Level Up Your Bug Bounty Effectiveness, Part II: Operational Areas to Continuously Improve

Hacker Engagement

First impressions matter! Win hackers over early on and create “anchor” hackers - program stalwarts that learn all about the...

Level Up Your Bug Bounty Effectiveness, Part II: Operational Areas to Continuously Improve
Vulnerability Management

Level Up Your Bug Bounty Effectiveness, Part II: Operational Areas to Continuously Improve

Hacker Engagement First impressions matter! Win hackers over early on and create “anchor” hackers - program...
HackerOne Blog - Main Image 24
Vulnerability Management

Level Up Your Bug Bounty Effectiveness: 3 Keys to Launch a Successful Program

With this two-part blog series, we will delve into strategies and tactics exhibited by dozens of enterprise...
HackerOne Blog - Main Blog Image 23
Ethical Hacker

What Does Belgium’s New Legal Framework On Hacking Mean For Me?

The Belgian government has recently announced a new Belgian law that will allow ethical hackers to hack any...
Ian Carroll, Staff Security Engineer @ Robinhood
Customer Stories, Bounty, Application Security, Best Practices

Robinhood Goes Long on Bug Bounty: Q&A with Ian Carroll and @ashwarya

Seven years of bug bounty, 21-hour average time to bounty, 130 hackers thanked, and hackers on both sides of...

HackerOne Blog - Blog Graphic 45
Vulnerability Management

Outsmart Cybercriminals with Proactive Attack Surface Management (ASM)

Why is ASM Important? Your attack surface is the sum of all entry points an attacker could use to access your...
HackerOne Blog
Vulnerability Management

Beyond a VDP: How a Challenge Brings Proactive Security to Your Agency

Vulnerability Disclosure Programs create an effective means for researchers and other users to report...
HackerOne Blog - Header Image 104
Penetration Testing

HackerOne Named a Leader in Penetration Testing as a Service (PTaaS) GigaOm Radar Report

The report provides a technical evaluation of key PTaaS vendor offerings in the market. A select group of...
HackerOne Blog
Security Compliance, Ethical Hacker

How Human Security Testing Helps the U.S. Government’s Zero Trust Mandate

One major reason for the progress is a May 2021 Executive Order that pushes federal agencies to speedily...