Skip to main content

Vulnerability Management

We cover everything in vulnerability management including discovery, prioritization, assessment, disclosure, and remediation.

HackerOne Blog
Vulnerability Management

HackerOne’s In-Depth Approach to Vulnerability Triage and Validation

Like triaging in a hospital emergency room, security issues must be diagnosed and handled by an expert as soon as they arrive. But it doesn’t stop...

Security by the People: Announcing HackerOne’s FedRAMP Authorization
Vulnerability Management, Policy and Advocacy

Security by the People: Announcing HackerOne’s FedRAMP Authorization

Since 2016, we’ve been proud to help secure critical U.S. Department of Defense and GSA applications. As we...

Stay Ahead of Threats With Hacker-Powered Retesting
Vulnerability Management, New Features

Stay Ahead of Threats With Hacker-Powered Retesting

Introducing Hacker-Powered Retesting! Retesting is designed to scale with capabilities to keep your critical...

Shopify Celebrates 5 Years on HackerOne
Vulnerability Management, Customer Stories, Bounty

Shopify Celebrates 5 Years on HackerOne

Five years ago, Shopify’s small but mighty security team began their hacker-powered security journey with...
Hyatt Celebrates its First Anniversary on HackerOne
Vulnerability Management, Customer Stories, Bounty

Hyatt Celebrates its First Anniversary on HackerOne

After becoming the first hospitality brand to launch a public bug bounty program, Hyatt recently celebrated...
Why Every Federal Agency Needs a VDP
Vulnerability Management, Vulnerability Disclosure

Why Every Federal Agency Needs a VDP

"The decision to require that every agency have a vulnerability disclosure policy is a major step forward in...
Gitlab Celebrates $1 Million in Bounties Milestone
Vulnerability Management, Customer Stories, Bounty

GitLab Celebrates Awarding $1 Million in Bounties to Hackers on HackerOne

Today, GitLab announced that they have awarded $1 million in bounties to hackers on HackerOne. To learn more...

Using Bug Bounty Talent Pools to Attract and Maintain Top Talent
Vulnerability Management

Using Bug Bounty Talent Pools to Attract and Maintain Top Talent

Security leaders today face a complex set of talent challenges—from training on the latest attack vectors, to...
Transparency Builds Trust
Vulnerability Management, Vulnerability Disclosure

Transparency Builds Trust

Someone called it a “breach,” and the world took notice. Here is the story.