Image Best Practices Application Security What Years of AWS Hacking Tells Us About Building Secure Apps January 12th, 2021 Imagine being part of an organization that has a security team that manages risks by... Read Now
Image Best Practices Application Security Bug Bounty Quantifying Risk: How do you measure success in security? December 10th, 2020 Every quarter, a CISO has to stand up in front of their leadership and attempt... Read Now
Image Application Security HackerOne Joins AWS Marketplace as Cloud Vulnerabilities Rise December 3rd, 2020 Addressing security risks at scale is more important than ever. With a global pandemic accelerating... Read Now
Image Application Security HackerOne is Excited to Launch Triage Ratings for Customers and Hackers November 5th, 2020 For customers and hackers, the triage experience is central to hacker-powered security. Our triagers consist... Read Now
Image Application Security Bug Bounty Securing video streaming in sub-Saharan Africa August 4th, 2020 Guest post by Jan Spitalnik, CTO of subscription video on demand service, Showmax Maintaining a... Read Now
Image Application Security Bug Bounty Costa Coffee prepares for global expansion with bug bounty program July 27th, 2020 When thinking about bug bounty customers, most people's minds will most likely go to huge... Read Now
Image Application Security Bug Bounty Visma’s Ioana Piroska on Securing the Development Lifecycle Through Bug Bounties July 17th, 2020 Visma is a leading business solution provider in Northern Europe, focusing on business optimization and... Read Now
Image Application Security Bug Bounty Announcing the PlayStation Bug Bounty Program June 24th, 2020 This guest post is authored by Geoff Norton, Senior Director Software Engineering at PlayStation, and... Read Now
Image Application Security Bug Bounty Scaling & Prioritizing Product Security with Zendesk June 18th, 2020 Zendesk, Inc. (NYSE: ZEN) is one of the fastest-growing customer support platforms in the world... Read Now