<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0" xml:base="https://www.hackerone.com/">
  <channel>
    <title>Research</title>
    <link>https://www.hackerone.com/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>A New Approach to Proving Cybersecurity Value (That Isn’t ROI)</title>
  <link>https://www.hackerone.com/blog/new-approach-proving-cybersecurity-value</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">A New Approach to Proving Cybersecurity Value (That Isn’t ROI)</span>
    



    
        Naz Bozdemir
        
            Senior Product Manager
      
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>joseph@hackerone.com</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Thu, 02/27/2025 - 08:13
</span>

            
  
      
  
    Image
                



          

  

      
            February 14th, 2025

      
            <p>Over the past 8 months,<a href="https://www.linkedin.com/in/hakluke?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAACcK9ewBCyIzphohk027wOvn6V6sdXUpumo">&nbsp;Luke (hakluke) Stephens</a> and I have spoken with 10 security executives, surveyed over 550 security professionals, and incorporated insights from HackerOne’s CISO Advisory Board. A key challenge emerged repeatedly in our conversations: security leaders need a better way to measure and justify their investments—one that accounts for the financial impact of mitigated risks.</p><p>In this blog, we are excited to&nbsp;<a href="https://www.hackerone.com/press-release/hackerone-introduces-new-cybersecurity-investment-metric-security-leaders-question">announce our white paper on Return on Mitigation (RoM)</a>, a framework we designed to quantify the financial impact of security programs in a way that speaks to business leaders.</p><h3><strong>Why traditional ROI falls short in cybersecurity</strong></h3><p>Organizations that apply traditional ROI models to cybersecurity often focus on cost-cutting measures like reducing headcount or operational expenses. However, this approach fails to account for security’s primary function: risk reduction and breach prevention.</p><p>As one CISO put it in our research:</p><p>"Security is often viewed as a cost center, not a revenue driver. ROI doesn’t work because you can’t always show direct returns—it’s about preventing damage, not generating income.”</p><p>By nature, security efforts protect revenue, brand reputation, and operational continuity by preventing financial losses rather than generating direct profit. Yet, these benefits are often difficult to quantify, making them harder to justify through traditional financial models.</p><h2><strong>Introducing the Return on Mitigation (RoM) framework</strong></h2><p>RoM offers a new way to approach cybersecurity justification by reframing security investments to avoid future losses—much like an insurance policy.</p><p>Instead of measuring revenue gained, RoM calculates mitigated losses. Instead of asking, "What revenue did this investment generate?" RoM asks, "What losses did we prevent by investing in cybersecurity measures?"</p><p>It does this by factoring in:</p><ul><li>The cost of a breach, using benchmarks like<a href="https://www.ibm.com/reports/data-breach">&nbsp;IBM’s Cost of a Data Breach Report</a></li><li>The likelihood of exploitation, based on real-world vulnerability data we modeled on<a href="https://www.verizon.com/business/en-gb/resources/reports/2024/dbir/2024-dbir-data-breach-investigations-report.pdf">&nbsp;Verizon's Data Breach Investigations Report</a></li><li>The cost of mitigation, including program investments and remediation efforts</li></ul><p>By replacing traditional ROI’s “net profit” with “avoided losses,” RoM can concretely quantify cybersecurity’s financial impact.</p><h3><strong>The RoM Calculator: A practical tool for security leaders</strong></h3><p>One of the biggest takeaways from our research was that security leaders need more than theory—they need tools and models to run these calculations in real-world scenarios.</p><p>The first-of-its-kind RoM calculator we developed in this study integrates security program results, the likelihood of exploitation through the concept of Exploitation Likelihood Score (ELS), and industry benchmarks to calculate total mitigation savings. It provides organizations with defensible metrics for demonstrating the value of their security programs.</p><p>I had the opportunity to run countless real-world calculations on HackerOne customers to measure the financial impact of their security programs in the last 2 months. The results each time confirm that:</p><p>With RoM, it is now possible to demonstrate how every dollar spent on proactive security directly protects the bottom line.</p><p>A security leader at a global financial infrastructure provider describes it best:</p><p>“RoM allows me to justify a $300,000 investment against a potential $5 million critical breach. With this metric, I can show how mitigating vulnerabilities through continuous security testing prevents costly breaches and justifies spending.”</p><p>&nbsp;</p><p>While the advanced RoM calculator is available to customers, we have also developed a&nbsp;<a href="https://www.hackerone.com/info/return-mitigation-calculator">light version</a> that allows anyone to explore the concept and run their calculations using high and critical severity findings.&nbsp;</p><h3><strong>HackerOne customers can run RoM calculations in real time</strong></h3><p>The RoM framework is now available to HackerOne customers, who can use the RoM calculator to measure their security investments in real financial terms.</p><p>With the<a href="https://www.hackerone.com/hai-your-hackerone-ai-copilot">&nbsp;HackerOne AI Copilot, Hai</a>, customers can automate RoM calculations on every vulnerability submitted to the HackerOne platform. This means customers can instantly assess the potential financial impact of each vulnerability and prioritize mitigation efforts based on real risk data. By incorporating things like program history, industry benchmarks, and other key factors—such as assigned CVSS, CVE, or EPSS figures—we can bring in various dimensions to our analysis and make these assumptions as realistic, defensible, and actionable as possible, all within the HackerOne platform.&nbsp;</p><p>And that’s just the beginning!</p><p>&nbsp;</p><h3>&nbsp;</h3><h3><strong>The future of RoM and how you can contribute</strong></h3><p>RoM provides security teams with a clear, quantifiable way to demonstrate their impact, making it easier to secure buy-in, budgets, and long-term investment in proactive security measures. However, for RoM to become a widely adopted industry standard, we need ongoing input from security professionals.</p><p>We’re actively refining RoM to ensure it remains a practical, defensible, and actionable framework for security investment justification. If you’d like to test the RoM calculator and provide feedback on how we can improve it,&nbsp;<a href="https://www.hackerone.com/contact">contact us</a> (or message me on&nbsp;<a href="https://www.linkedin.com/in/nazbozdemir/">LinkedIn</a>)— we’d love your insights.</p><p>To learn more, you can read the&nbsp;<a href="https://ma.hacker.one/rom-whitepaper-2025.html">full white paper</a> and join HackerOne’s webinar, “<a href="https://ma.hacker.one/return-on-mitigation-workshop-2025.html">Quantify the Financial Impact of Cybersecurity with Return on Mitigation,</a>” on March 12, 2025. In this webinar, we’ll discuss real-world applications of RoM and how you can use it in your organization!</p>
      

            
            <a href="https://www.hackerone.com/blog/topic/return-mitigation" hreflang="en">Return on Mitigation</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/research" hreflang="en">Research</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/best-practices" hreflang="en">Best Practices</a>
        
    

            <p><a href="https://www.hackerone.com/blog/roi-isnt-cutting-it-6-questions-help-cisos-better-quantify-security-investments"><em>How do you justify a cybersecurity investment?</em></a> It’s a question every security leader struggles with. The problem is that the traditional Return on Investment (ROI) model simply doesn’t work in cybersecurity. Unlike traditional investments that generate direct revenue, security spending is all about risk reduction, breach prevention, and avoiding financial losses.</p><p dir="ltr"><em>But how do you quantify the value of something that hasn't happened?</em></p>
      ]]></description>
  <pubDate>Thu, 27 Feb 2025 14:13:28 +0000</pubDate>
    <dc:creator>joseph@hackerone.com</dc:creator>
    <guid isPermaLink="false">5560 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Top 5 Takeaways from the 2021 Hacker-Powered Security Report: Industry Insights</title>
  <link>https://www.hackerone.com/blog/top-5-takeaways-2021-hacker-powered-security-report-industry-insights</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Top 5 Takeaways from the 2021 Hacker-Powered Security Report: Industry Insights</span>
    



    
        H1 Team
        
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Tue, 12/21/2021 - 11:22
</span>

            
  
      
  
    Image
                



          

  

      
            December 21st, 2021

      
            <p>For the fifth year in a row, HackerOne published a report that provides insights from the world’s largest database of vulnerabilities and bug bounty customer programs. Here are the top five findings:</p><ol><li>The adoption of ethical hacker programs is growing across all industries, with a 34% increase in total customer programs in 2021. The traditionally conservative industries of financial services and government continue to lead in the adoption of these testing programs, with a 62% increase in financial services programs and an 89% increase of government programs, led this year by the UK’s Ministry of Defence and Singapore’s GovTech agency.<br>&nbsp;</li><li>Hackers reported 21% more vulnerabilities in 2021 than in 2020. While traditional bug bounty saw a 10% increase in valid vulnerability reports, Vulnerability Disclosure Programs (VDPs) saw a 47% increase, and reports from hacker-powered pentests rose by 264%.<br>&nbsp;</li><li>The median price of a critical bug rose 20% from $2,500 in 2020 to $3,000 in 2021. The average bounty price for a critical bug rose by 13%, and by 30% for a high severity-rated bug.&nbsp;<br>&nbsp;</li><li>In the past year, the industry-wide median time to resolution fell by 19% from 33 days to 26.7 days, with some industries such as retail and e-commerce seeing time-to-remediation dropping by more than 50%.<br>&nbsp;</li><li>The number-one most discovered bug on HackerOne continues to be Cross Site Scripting, but other bug categories have seen a significant increase since 2020. Information Disclosure saw a 58% increase in valid reports and Business Logic Errors had a 67% increase, giving them a spot on the HackerOne Top 10 for the first time.&nbsp;</li></ol><p><br>Join HackerOne’s new CISO, Chris Evans, to delve into the findings of the report at a free webinar where you’ll discover the fastest-growing vulnerability categories, how bounty prices are changing year over year, and which industries are fastest to fix. Read the full 2021 Hacker-Powered Security Report: Industry Insights <a href="https://www.hackerone.com/5th-hacker-powered-security-report">here</a>.</p>
      

            
            <a href="https://www.hackerone.com/blog/topic/research" hreflang="en">Research</a>
        
    
]]></description>
  <pubDate>Tue, 21 Dec 2021 17:22:41 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5126 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Organizations Paid Hackers $23.5 Million for These 10 Vulnerabilities in One Year</title>
  <link>https://www.hackerone.com/blog/organizations-paid-hackers-235-million-these-10-vulnerabilities-one-year-1</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Organizations Paid Hackers $23.5 Million for These 10 Vulnerabilities in One Year</span>
    



    
        H1 Team
        
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Thu, 10/29/2020 - 08:00
</span>

            
  
      
  
    Image
                



          

  

      
            October 29th, 2020

      
            <p>In times of uncertainty, security becomes an ever more pressing priority. The stakes are high: organizations are more reliant on technology than ever and anyone relying on technology can lose everything in a data breach. But some of the most recent vulnerabilities have one thing in common: they were detected, discovered and reported by friendly hackers who can think like attackers.</p><p>“This year, organizations worldwide were forced to go digital with their product offerings and services,” said HackerOne Senior Director of Product Management Miju Han. “Businesses scrambled to find new revenue streams, creating digital offerings for customers whose lifestyles had dramatically changed. Tens of millions of workers started working remotely whether or not they were ready. With this accelerated pace of digital transformation, CISOs had to quickly facilitate new needs while ensuring the security of existing systems. Faced with these obstacles, security leaders have gained newfound appreciation for hacker-powered security as a nimble, scalable, and cost-effective solution to augment their own resources and offer a pay-for-results approach that’s more justifiable under tightened budgets.”</p><p>HackerOne maintains the most authoritative database of vulnerabilities in the industry. With over 200,000 valid vulnerabilities found by hackers, HackerOne took a look into this data to glean insights from the top 10 most impactful and rewarded vulnerability types.</p><p>HackerOne’s Top 10 Most Impactful and Rewarded Vulnerability Types of 2020, in descending order, are:</p><ol><li>Cross-site Scripting (XSS)</li><li>Improper Access Control </li><li>Information Disclosure</li><li>Server-Side Request Forgery (SSRF)</li><li>Insecure Direct Object Reference (IDOR)</li><li>Privilege Escalation</li><li>SQL Injection</li><li>Improper Authentication </li><li>Code Injection</li><li>Cross-Site Request Forgery (CSRF)</li></ol><p>Taking a closer look at this year’s top ten in comparison to the <a href="https://www.hackerone.com/application-security/hacker-powered-data-security-weaknesses-and-embracing-risk-hackerone">2019</a> top ten vulnerabilities, key findings include:</p><ul><li><strong>Cross-site Scripting </strong>vulnerabilities continue to be a major threat to web applications as attackers exploiting XSS attacks can gain control of the user’s account and steal personal information such as passwords, bank account numbers, credit card info, personally identifiable information (PII), social security numbers, and more. The most awarded vulnerability two-years running, XSS vulnerabilities cost organizations US$4.2 million in total bounty awards, up 26% from the previous year. These bugs account for 18% of all reported vulnerabilities, but the average bounty award is just US$501. With the average bounty for a critical vulnerability being $3,650, this means organizations are mitigating this common, potentially painful bug on the cheap.</li><li><strong>Improper Access Control</strong> (up from ninth place in 2019) and <strong>Information Disclosure </strong>(still holding the third spot) remain common. Awards for Improper Access Control increased 134% year over year to just over US$4 million. Information Disclosure was not far behind, increasing 63% year over year. Access control design decisions have to be made by humans, not technology, and the potential for errors is high, and both errors are nearly impossible to detect using automated tools. </li><li><strong>SSRF </strong>vulnerabilities, which can be exploited to target internal systems behind firewalls, show the risk of cloud migrations. Previously, SSRF bugs were fairly benign and held our seventh place spot, as they only allowed internal network scanning and sometimes access to internal admin panels. But in this era of rapid digital transformation, the advent of cloud architecture and unprotected metadata endpoints has rendered these vulnerabilities increasingly critical.</li><li><strong>SQL Injection</strong> is dropping year-over-year. Considered one of the worst threats to web application security by OWASP and others, the scale of SQL injection attacks can be devastating, as sensitive data, including business information, intellectual property, and critical customer data, is stored on database servers susceptible to these attacks. In years past, SQL injection was one of the most common vulnerability types. However, our data indicate that it’s been dropping year-over-year from fifth in 2019 to seventh in 2020. By shifting security left, organizations are leveraging hackers and other methods to proactively monitor attack surfaces and prevent bugs from entering code.</li></ul><p>“Finding the most common vulnerability types is inexpensive,” Han continued. “Of the top 10 most awarded weakness types, only Improper Access Control, Server-Side Request Forgery (SSRF), and Information Disclosure saw their average bounty awards rise more than 10%. The others fell in average value or were nearly flat. Unlike traditional security tools and methods, which become more expensive and cumbersome as goals change and attack surface expands, hacker-powered security is actually more cost-effective as time goes on. With hackers, it’s becoming less expensive to prevent bad actors from exploiting the most common bugs.”</p><p>For the full HackerOne Top 10 Most Impactful and Rewarded Vulnerability Types - 2020 Edition, please visit&nbsp;<a href="https://www.hackerone.com/top-ten-vulnerabilities">https://www.hackerone.com/top-ten-vulnerabilities</a></p><p><strong>About HackerOne</strong><br>HackerOne empowers the world to build a safer internet. As the world’s most trusted hacker-powered security platform, HackerOne gives organizations access to the largest community of hackers on the planet. Armed with the most robust database of vulnerability trends and industry benchmarks, the hacker community mitigates cyber risk by searching, finding, and safely reporting real-world security weaknesses for organizations across all industries and attack surfaces. Customers include The U.S. Department of Defense, Dropbox, General Motors, GitHub, Goldman Sachs, Google, Hyatt, Intel, Lufthansa, Microsoft, MINDEF Singapore, Nintendo, PayPal, Qualcomm, Slack, Starbucks, Twitter, and Verizon Media. HackerOne was ranked fifth on the Fast Company World’s Most Innovative Companies list for 2020. Headquartered in San Francisco, HackerOne has a presence in London, New York, the Netherlands, France, Singapore, and over 70 other locations across the globe.</p><p><strong>Methodology</strong><br>This edition of the HackerOne Top 10 Most Impactful and Rewarded Vulnerability Types was based on HackerOne’s proprietary data examining security weaknesses resolved on the HackerOne platform between May 2019 and April 2020. Vulnerabilities included here were reported by the hacker community through vulnerability disclosures and public and private bounty programs. All vulnerability classifications were made or confirmed by HackerOne customers, including weakness type, impact, and severity.</p><p>Note: The <a href="https://www.hackerone.com/vulnerability-management/introducing-cwe-based-weaknesses">vulnerability rating taxonomy</a>, which HackerOne maps to the industry standard Common Weakness Enumeration, is used by HackerOne customers and hackers to categorize reported vulnerabilities. Data presented here is from May 2019 through April 2020.</p>
      

            
            <a href="https://www.hackerone.com/blog/topic/research" hreflang="en">Research</a>
        
    
]]></description>
  <pubDate>Thu, 29 Oct 2020 13:00:00 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5018 at https://www.hackerone.com</guid>
    </item>

  </channel>
</rss>
