Image Best Practices Preventing Compromised Password Reuse on HackerOne.com March 11th, 2022 This week, we rolled out an improvement to account security on the HackerOne website. We... Read Now
Image Best Practices Bug Bounty Shifting Left with Ethical Hackers: A Q&A with GitLab March 8th, 2022 We sat down with James Ritchey, Application Security Team Manager at GitLab and a three-year... Read Now
Image Best Practices Penetration Testing Bug Bounty Jedox’s Journey with HackerOne: A Q&A with CTO, Vladislav Maličević October 28th, 2021 *Editor's note: A security researcher is anyone who investigates a potential security issue in some... Read Now
Image Best Practices Vulnerability Management Bug Bounty Hyatt's Bug Bounty Program Update: Q&A with Senior Analyst Robert Lowery August 18th, 2021 Q: Tell us who you are. I'm Robert Lowery, Senior Analyst at Hyatt. I'm part... Read Now
Image Best Practices Vulnerability Management One Month of Learnings from Flo Health’s Bug Bounty Program: A Q&A with CISO, Leo Cunningham August 4th, 2021 The CISO of Flo Health, the world’s most popular women’s health app, knows that enabling... Read Now
Image Best Practices Vulnerability Management Bug Bounty Citrix's Hacker-Powered Security Growth Plan: Q&A with Abhijith Chandrashekar June 16th, 2021 With over 400,000 customers, Citrix is a recognized industry leader in both digital workspace technology... Read Now
Image Best Practices A Security Engineer and Hacker Share Their Experiences with Security Assessments May 3rd, 2021 App Security is More Vital than Ever The number of apps that organizations and individuals... Read Now
Image Best Practices Vulnerability Management How HackerOne Helps the Vulnerability Management Process April 29th, 2021 How HackerOne Helps the Vulnerability Management Process HackerOne sees vulnerability management as a process combining... Read Now
Image Best Practices Application Security What Years of AWS Hacking Tells Us About Building Secure Apps January 12th, 2021 Imagine being part of an organization that has a security team that manages risks by... Read Now