Best Practices & Guidance
Advice and guidance from hacker-powered security experts.
-
33:45Watch VideoBuilding VDP for Success - NA
-
Read MoreSecurity Leaders Handbook
A guide for making meaningful progress on improving your security posture
-
Read MoreVDP Guide for Financial Services
-
Read MoreBug Bounty Field Manual for Financial Services
-
Read MoreThe Hacker-Powered Security Report 2019
-
Read MoreThe Hacker-Powered Security Report 2019: Financial and Insurance
-
Read MoreVulnerability Disclosure Policy. What is it. Why you need one. How to get started.
This three-part series answers all your questions on VDP best practices.
-
Read MoreVulnerability Disclosure Policy Basics: 5 Critical Components
12-page booklet providing advice for creating a vulnerability disclosure page - along with great quotes about why this matters.
-
Read MoreGuidance for Financial Product: Product: Services on Vulnerability Disclosure Policy Basics
Specific to Finserv on details needed to implement a complete and compliant policy. Takes the VDP guide and updates with finserv intro and Goldman Sachs policy example
-
Read MoreThe Beginners' Guide to Hacker-Powered Security
17-page booklet that highlights how hacker-powered security can work alongside established security efforts.
-
Read MoreSecure from the Start: The Complete Guide for Entrepreneurs
Secure from the Start: The Complete Guide for Entrepreneurs summarizes the key security topics that every technology entrepreneur needs to understand.
-
Read MoreThe Hacker-Powered Security Report 2018: Financial Product: Product: Services + Insurance
Vulnerability data and hacker-powered security adoption metrics for the financial services industry.
-
Read MoreNext-Gen Solutions: Application Security Launch Effective Agile Security for Agile Development
Improving application security by incorporating bug bounties and crowdsourced pen tests into DevOps pipeline.
-
Read MoreTop 20 Public Bug Product: Bounty Programs
In this list, you’ll see which programs on the HackerOne platform ranked highest on the total amount of bounties awarded to hackers over the life of the program.
-
Read More7 Common Security Pitfalls to Avoid When Migrating to the Cloud
12-page booklet that defines the most common security pitfalls when migrating to the cloud and how to prevent security regression.
-
Read MoreYelp's First 100 Days of a Public Bug Product: Bounty Program
-
Read MoreWordpress Q&A With Security Team Lead
-
Read MoreShopify's Customer Story
-
Read MoreSalesforce Customer Story
-
Read MoreRiot Games' Customer Story
-
Loading More...


