Image Best Practices Application Security Bug Bounty Robinhood Goes Long on Bug Bounty: Q&A with Ian Carroll and @ashwarya February 22nd, 2023 Our conversation with Ian Carroll (Staff Security Engineer at Robinhood) spans the history of bug... Read Now
Image Best Practices Cloud Security Bug Bounty How OneWeb is Safeguarding its Assets with the Hacker Community November 15th, 2022 We recently sat down with Wendy Ng, Principal Cloud Security Architect at OneWeb, to talk... Read Now
Image Best Practices Bug Bounty TikTok Celebrates Two Years of Bug Bounty October 11th, 2022 In the last two years of their bug bounty program, the hacker community has helped... Read Now
Image Bug Bounty Announcing the Results of Hack U.S. September 29th, 2022 HackerOne met with Katie Savage, Deputy Chief Digital & Artificial Intelligence Officer at DDS, and... Read Now
Image Bug Bounty PayPal's Third LHE Brings Top Global Hackers to the Virtual Stage July 29th, 2022 PayPal has been partnering with the hacker community since launching a bug bounty program in... Read Now
Image Best Practices Application Security Vulnerability Management Bug Bounty How Wix Improves Their Security Posture with Ethical Hackers April 21st, 2022 Reducing risk is fundamental to Wix’s approach to cybersecurity, and as the threat landscape evolves... Read Now
Image Best Practices Bug Bounty Shifting Left with Ethical Hackers: A Q&A with GitLab March 8th, 2022 We sat down with James Ritchey, Application Security Team Manager at GitLab and a three-year... Read Now
Image Bug Bounty TikTok Celebrates One Year of Bug Bounty November 19th, 2021 For TikTok, a platform that sees more than one billion monthly active users, staying ahead... Read Now
Image Best Practices Penetration Testing Bug Bounty Jedox’s Journey with HackerOne: A Q&A with CTO, Vladislav Maličević October 28th, 2021 *Editor's note: A security researcher is anyone who investigates a potential security issue in some... Read Now