<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0" xml:base="https://www.hackerone.com/">
  <channel>
    <title>Vulnerability Disclosure Program</title>
    <link>https://www.hackerone.com/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>General Motors Celebrates Long-Term Success With Hackers</title>
  <link>https://www.hackerone.com/blog/general-motors-celebrates-long-term-success-hackers</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">General Motors Celebrates Long-Term Success With Hackers</span>
    



    
        H1 Team
        
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Thu, 03/15/2018 - 15:13
</span>

            
  
      
  
    Image
                



          

  

      
            March 15th, 2023

      
            <p>Just over two years ago, General Motors became the first major automaker to launch a <a href="https://hackerone.com/gm">public Vulnerability Disclosure Program (VDP)</a>. Its purpose? To protect its customers by working with hackers to safely identify and resolve security vulnerabilities. Since the program launched in 2016, GM has resolved more than 700 vulnerabilities across the entire supply chain, with help from hackers.<br>&nbsp;<br>“We value the expertise of the security research community, and have been very pleased with the program’s performance to date,” said Jeff Massimilla, Vice President Global Cybersecurity at GM. “Researchers are engaged, and the quality of information we’re receiving is extremely valuable and is helping us improve security across all areas of GM.”&nbsp;</p><h2>GM's Program by the Numbers</h2><p>To date, GM has worked with more than 500 hackers from all over the world. Access to this caliber of researchers wouldn’t be possible without this program.</p><p>&nbsp;</p><p>“The global community of friendly hackers brings diverse perspectives and techniques that can surface vulnerabilities faster than a security team going at it alone,” said Alex Rice, co-founder and CTO, HackerOne. “GM is the perfect example of an innovative company embracing the hacker community to surface bugs and supplement the great work their internal security team is already doing.”</p><h2>Hackers as an Extension of the Security Team</h2><p>GM responds to and fixes reported bugs with impressive speed and agility, including those found with any of its suppliers, making it one of the most comprehensive vulnerability disclosure programs across industries in terms of scope. How can they tackle such a tall order? GM has a broad, experienced internal security team, including full-time internal red teams. Even with such a mature security team structure, GM taps the ethical hacker community to help find what they might have missed.<br>&nbsp;<br>“We’ve always approached security with a diverse set of tools in our toolbox,” said Massimilla. “Leveraging HackerOne’s relationship with the research community, and seeing firsthand the results they provide, has been extremely encouraging. Hackers have become an essential part of our security ecosystem.”<br>&nbsp;<br>As cyber risks evolve, so has GM’s internal organization. Since launching the VDP as the Chief Product Cybersecurity Officer at GM, Massimilla has now taken on the role of Vice President of Global Cybersecurity. This newly formed organization merges all cybersecurity activity - both product and corporate cybersecurity - into one central organization. This organizational shift reflects the progressive mindset within GM.<br>&nbsp;<br>“We are taking a holistic approach to cybersecurity at General Motors” explained Massimilla. “In today’s connected world, it’s critically important that product and corporate cybersecurity functions are aligned across all areas of the business.”</p><h2>Outlook</h2><p>GM is leading the automotive industry into the 21st century with a close eye on cybersecurity. According to HackerOne research, only seven of the top 50 automotive manufacturers have a way for external researchers to report vulnerabilities. Four of these seven fall under the GM brand: Buick, Cadillac, Chevrolet and GMC. Furthermore, only two of the top 50 suppliers of the automotive industry have a channel for disclosure. This may seem like a stark comparison to the digitally native technology industry, but it is progress nonetheless. GM’s VDP is setting a new standard of collaborative cybersecurity in the name of public safety. It’s not just a car company, GM is a technology company.<br>&nbsp;<br>“We’re taking cybersecurity very seriously at General Motors. It’s a top priority for our company, and our most senior executives, including the CEO, fully support our organization,” said Massimilla. “We are employing strategies and programs, like our VDP with HackerOne, with the sole purpose of protecting our customers, their vehicles and their data.”<br>&nbsp;<br>Stay tuned for more from GM’s security team as they prepare to launch a unique hacking challenge soon to expand their program and deepen relationships with the security community.<span data-reactroot> Discover more about our </span><a href="https://www.hackerone.com/product/overview"><span data-reactroot>security testing solutions</span></a><span data-reactroot> or </span><a href="https://www.hackerone.com/contact"><span data-reactroot>Contact Us</span></a><span data-reactroot> today.</span></p>
      
            
                                                                                <a href="https://www.hackerone.com/blog/community" hreflang="en">Researcher Community</a>, 
                                                                                <a href="https://www.hackerone.com/blog/customer-stories" hreflang="en">Customer Stories</a>
                    
    

            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-disclosure-program" hreflang="en">Vulnerability Disclosure Program</a>
        
    

            <p>General Motors has been engaged with HackerOne for seven years. Here's what the team at General Motors had to say about their experience with HackerOne and the progress they'd made after two years of its Vulnerability Disclosure Program.</p>
      ]]></description>
  <pubDate>Thu, 15 Mar 2018 20:13:16 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">4756 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Ethical Hackers Help Beiersdorf Minimize Risk and Protect Their Attack Surface</title>
  <link>https://www.hackerone.com/blog/ethical-hackers-help-beiersdorf-minimize-risk-and-protect-their-attack-surface</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Ethical Hackers Help Beiersdorf Minimize Risk and Protect Their Attack Surface</span>
    



    
        elizabeth@hackerone.com 
        
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Thu, 06/02/2022 - 07:00
</span>

            
  
      
  
    Image
                



          

  

      
            June 2nd, 2022

      
            <p>Beiersdorf’s cybersecurity team is always thinking about the best ways to secure their public-facing assets. As their digital footprint increases, they add new processes and systems to align with cybersecurity best practices and look for new ways to arm their internal teams with insights and data to help harden their <a href="https://www.hackerone.com/product/attack-surface-management">attack surface management</a>.&nbsp;</p><p>After a year of running a private <a href="https://www.hackerone.com/product/response-vulnerability-disclosure-program" target="_blank">Vulnerability Disclosure Program</a> (VDP), Beiersdorf is announcing the launch of its <a href="https://hackerone.com/beiersdorf?type=team" target="_blank">public VDP</a>. HackerOne met with Kai Widua, Chief Information Security Officer (CISO) at Beiersdorf, to learn about the challenges they face in retail security.&nbsp;</p><p>Read on to hear Kai’s thoughts on how HackerOne helps Beiersdorf be proactive about cybersecurity and his advice on starting a VDP and taking it public.&nbsp;</p><p><strong>Tell us who you are.</strong></p><p>I’m Kai Widua, CISO at Beiersdorf. I’m responsible for the Information Security in Beiersdorf globally. In this role, I deal with proactive and detective requirements to protect customer, affiliate, and employee data in cyberspace.</p><p><strong>Tell us a bit about Beiersdorf and the cybersecurity challenges you face.&nbsp;</strong></p><p>Beiersdorf started to leverage the potential of cloud computing services before many other organizations. We have a standardized, centralized, managed IT program with many partners and systems integrated into our digital life, which increases our digital footprint and creates a broad attack surface. The adaption of implemented security policies and controls is a challenge, as we work to ensure information security is an enabler and not a “hinderer.”</p><p><strong>How does your security team operate?&nbsp;</strong>&nbsp;</p><p>The digital experts in the DevOps teams are challenged to use an agile approach to increase development speed and shorten release cycles while also fulfilling security requirements and maintaining code hygiene. Beiersdorf’s cybersecurity department is responsible for the consultant and gatekeeper roles to help us close potential gaps in our attack surface by informing other departments about potential risks, new attack vectors,&nbsp; and techniques to minimize overall organizational risk.&nbsp;</p><p><strong>What made you decide to launch a public VDP?</strong></p><p>Our Web Development Team has a tough job, and they do it very well. As an additional layer of defense, we decided to use the global knowledge of ethical hackers via a VDP, so we could be informed even when it is actually too late (meaning a vulnerability is published) but still early enough to identify and remediate the vulnerability before a malicious actor might find it.&nbsp;</p><p><strong>How does a VDP help proactively prevent issues?&nbsp;</strong></p><p>By adding a VDP, we not only support our Web Development Team’s tremendous efforts, but we also take proactive steps to minimize our risk. The VDP allows global security experts to review our public assets and give us deeper knowledge of our attack surface, which we can use to better inform our team and create more robust defenses via internal processes.&nbsp;</p><p><strong>How does digital transformation drive your cybersecurity strategy?&nbsp;</strong></p><p>Digital transformation certainly speeds up deployments, but it also increases the number of systems and sources we use. Minimum viable products (MVPs) are a specific lever to speed up time-to-market but can threaten the needed protection level. A VDP is a perfect and obligatory complement to our digital transformation journey, giving us an additional layer of defense.</p><p><strong>What happens after a hacker finds a bug?&nbsp;</strong></p><p>We see a lot of commodity attacks against our systems. But sometimes, we see very creative ways hackers have tricked our system landscape. This is a valuable source of intelligence apart from OWASP or other frameworks. These unusual findings make the difference for our DevOps teams and can be adapted to all other systems we operate.&nbsp;</p><p><strong>What advice would you give to other CISOs planning to start a VDP?</strong></p><p>Start small. Get yourself and the teams familiar with how researchers approach the program and the triage process. This will support the ramp-up and ensure you’re going as fast as you can adequately manage. We had an excellent learning experience with our private program, which helped us be confident and prepared before going public.</p><p>&nbsp;</p><p>&nbsp;</p><p>--</p><p>Click&nbsp;<a href="https://www.hackerone.com/product/response-vulnerability-disclosure-program">here</a>&nbsp;for more information about Vulnerability Disclosure Programs.</p>
      
            
                                                                                <a href="https://www.hackerone.com/blog/customer-stories" hreflang="en">Customer Stories</a>
                    
    

            
            <a href="https://www.hackerone.com/blog/topic/best-practices" hreflang="en">Best Practices</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-management" hreflang="en">Vulnerability Management</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-disclosure-program" hreflang="en">Vulnerability Disclosure Program</a>
        
    

            <p><span><span><span><span><span><span><a href="https://www.beiersdorf.com/" target="_blank">Beiersdorf</a>, a worldwide leader in skincare, is one of many organizations rapidly expanding IT initiatives to help drive digital transformation and proactive security practices. In partnership with its IT affiliate organization Beiersdorf Shared Services (BSS), security initiatives are always top of mind for Beiersdorf. And for a good reason, as their global presence includes consumer and manufacturing business segments in 200+ global markets, with more than 170 affiliate partners and over 20,000 employees.&nbsp;</span></span></span></span></span></span></p>
      ]]></description>
  <pubDate>Thu, 02 Jun 2022 12:00:00 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5149 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Announcing the Results of the 12-month DIB-VDP Pilot</title>
  <link>https://www.hackerone.com/blog/announcing-results-12-month-dib-vdp-pilot</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Announcing the Results of the 12-month DIB-VDP Pilot</span>
    



    
        H1 Team
        
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Mon, 05/02/2022 - 09:32
</span>

            
  
      
  
    Image
                



          

  

      
            May 2nd, 2022

      
            <p><a href="https://www.hackerone.com/sites/default/files/inline-images/HAC-DIB%20VDP-Infographic_Results_Vertical_L1R1%402x.jpg" target="_blank"></a></p><p>Learn more about the DoD DIB-VDP Pilot <a href="https://www.hackerone.com/press-release/12-month-dib-vdp-pilot-concludes" target="_blank">here</a>.</p>
      
            
                                                                                <a href="https://www.hackerone.com/blog/customer-stories" hreflang="en">Customer Stories</a>
                    
    

            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-management" hreflang="en">Vulnerability Management</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-disclosure-program" hreflang="en">Vulnerability Disclosure Program</a>
        
    

            <p><span><span><span><span><span><span>When the Defense Industrial Base <a href="https://www.hackerone.com/product/response-vulnerability-disclosure-program">Vulnerability Disclosure Program</a> (DIB-VDP) 12-month Pilot <a href="https://www.hackerone.com/press-release/12-month-dib-vdp-pilot-concludes" target="_blank">concluded</a>, HackerOne sat down with the pilot's collaborating agencies and the ethical hackers who worked on the pilot. The discussion centered on pilot results, the most exciting vulnerabilities that surfaced, and learning why the federal government continues to engage hackers to secure the digital assets of the United States government. </span></span></span></span></span></span></p>
      ]]></description>
  <pubDate>Mon, 02 May 2022 14:32:42 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5139 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Securing Digital Transformation with Vulnerability Disclosure: A Q&amp;A with John Deere CISO, James Johnson</title>
  <link>https://www.hackerone.com/blog/securing-digital-transformation-vulnerability-disclosure-qa-john-deere-ciso-james-johnson</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Securing Digital Transformation with Vulnerability Disclosure: A Q&amp;A with John Deere CISO, James Johnson</span>
    



    
        elizabeth@hackerone.com 
        
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Thu, 02/03/2022 - 15:31
</span>

            
  
      
  
    Image
                



          

  

      
            February 9th, 2022

      
            <p>John Deere’s CISO, James Johnson, and his team are committed to ensuring that the people who depend on John Deere for their livelihood rest easy knowing their information and products are secure. To help fortify security defenses for their customers, dealers, suppliers, and employees, John Deere recently launched a public Vulnerability&nbsp;Disclosure Program (VDP) with HackerOne.</p><p>Read on to learn why James and the John Deere security team leverage ethical hackers to help identify security gaps and increase their product and data security.</p><p><strong>Q: Tell us who you are and your role at John Deere.</strong></p><p>I’m&nbsp;James Johnson, John Deere's Chief Information Security Officer. I joined&nbsp;<a>John Deere&nbsp;</a>about seven years ago&nbsp;<a href="https://www.deere.com/en/our-company/news-and-announcements/newsroom/building-culture-of-security/" target="_blank">to lead the security organization and build a security-focused culture</a>.</p><p><strong>Q: Tell us a bit about John Deere and why cybersecurity is so important.</strong></p><p><strong>James</strong>:<em>&nbsp;Integrity, Quality, Commitment,</em>&nbsp;and&nbsp;<em>Innovation</em>&nbsp;are the core values that define&nbsp;<a>John Deere</a>, and cybersecurity is critical to these core values.</p><p>There are a lot of people depending on John Deere – from our customers, dealers, and suppliers, to our employees around the world. Cybersecurity is so important because we need to protect our data and systems and avoid business disruption to live up to John Deere’s role to meet the world’s food and infrastructure needs. We need to live up to the promises we have made to our&nbsp;customers, dealers, suppliers, and employees, and that’s something that motivates our security team members every day.</p><p><strong>Q:&nbsp;Tell us about the security challenges you faced that led you to HackerOne.</strong></p><p><strong>James</strong>: At John Deere, like many other companies, we are integrating more technologies, increasing connectivity, and producing more data than ever. This digital evolution has brought on more challenges within cybersecurity, and our teams have risen to the occasion. As we evolved our vulnerability management process, we realized a missing component was an easy way for an external security researcher to report an issue.&nbsp;HackerOne has helped fill that gap, helping us further mature our approach to vulnerability management.</p><p><strong>Q: What made you decide to launch a public VDP?</strong></p><p><strong>James</strong>: We followed the advice from HackerOne, starting with a private program then transitioning to a public program after working out our internal processes. Before taking the program public, it was important that we knew we would be able to respond to the researchers participating in our program in a timely manner and create a good experience for them. Once we were confident in our processes, it was a collaborative discussion between our John Deere team and the HackerOne representatives that made us decide to go public.</p><p><strong>Q: How have ethical hackers helped you reduce risk?</strong></p><p><strong>James</strong>: The speed at which new vulnerabilities can arise is challenging for any company to keep up with. The researchers we have worked with are subject matter experts on these vulnerabilities and have found ways to quickly test and report them. Their skill and talent help us reduce risk because speed matters.&nbsp;We&nbsp;want vulnerabilities to be found and fixed before they can be exploited, and we’ve been able to accomplish this with help from researchers.</p><p><strong>Q: How do you leverage insights throughout the software&nbsp;development life cycle?</strong></p><p><strong>James</strong>: Over the past several years, we have developed a&nbsp;<a href="https://www.deere.com/en/stories/featured/security-by-design-helps-developers-secure-john-deeres-products/" target="_blank">Security by Design program</a>, which has instilled a security mindset within the development community at John Deere. Security by Design combines people, processes, and technologies to create a culture of security throughout the software development life cycle. Security professionals sit on teams with developers to secure code, educate, and share best practices. We are able to learn from our VDP and bring those examples as learning opportunities directly to development teams through the Security by Design program.</p><p><strong>Q: What advice would you give to other CISOs planning to start a VDP?</strong></p><p><strong>James</strong>: Having a VDP is a core component to a robust vulnerability management program. Cultivating a positive relationship with the researcher community is incredibly valuable to your overall security program.</p><p><strong>Q: What about advice for program leads planning to start a VDP?</strong></p><p><strong>James</strong>: Start by benchmarking with other companies and hearing their lessons learned. &nbsp;Make sure your internal teams are ready to handle the submissions from your VDP, will provide a timely response to researchers, and will give them a positive experience with your program.</p><p><strong>Q: What will long-term success look like?</strong></p><p><strong>James</strong>: We are excited to continue to learn from our VDP, and we want to keep maturing the program. We want our program to attract the best researchers and give them a great experience working with our teams. To this end, we are exploring offering bounties in the future.</p><p>--</p><p>Click&nbsp;<a href="https://www.hackerone.com/product/response-vulnerability-disclosure-program">here</a>&nbsp;for more information about Vulnerability Disclosure Programs.</p>
      
            
                                                                                <a href="https://www.hackerone.com/blog/customer-stories" hreflang="en">Customer Stories</a>
                    
    

            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-management" hreflang="en">Vulnerability Management</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-disclosure-program" hreflang="en">Vulnerability Disclosure Program</a>
        
    

            <p>To help fortify security defenses for their customers, dealers, suppliers, and employees, John Deere recently launched a public Vulnerability&nbsp;Disclosure Program (VDP) with HackerOne.</p>

<p>HackerOne met with James Johnson, Chief Information Security Officer (CISO) at John Deere, to learn why his security team works with ethical hackers to help identify security gaps and increase their product and data security.</p>
      ]]></description>
  <pubDate>Thu, 03 Feb 2022 21:31:21 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5131 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Nine Months into the DIB-VDP Pilot, Nearly 1,000 Valid Vulnerabilities Have Been Identified</title>
  <link>https://www.hackerone.com/blog/nine-months-dib-vdp-pilot-nearly-1000-valid-vulnerabilities-have-been-identified</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Nine Months into the DIB-VDP Pilot, Nearly 1,000 Valid Vulnerabilities Have Been Identified</span>
    



    
        elizabeth@hackerone.com 
        
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Fri, 01/28/2022 - 08:45
</span>

            
  
      
  
    Image
                



          

  

      
            January 28th, 2022

      
            <p>Maintaining the security of the digital assets within the Defense Industrial Base (DIB) contractor networks helps defend the United States of America. For the last nine months, Department of Defense (DOD) agencies Defense Cyber Crime Center (DC3) and Defense Counterintelligence and Security Agency (DCSA) have worked together with ethical hackers from around the world to improve the security of critical assets within DIB vendors and contractors.</p><p>With 39 DIB companies signed up in the first nine months (and more signing up in the final three-month stretch of the pilot), ethical hackers have a chance to test their skills on various government agencies’ cybersecurity strategies.&nbsp; “Hackers consistently bring new levels of creativity to potential threats to our DIB companies’ attack surface. Every vulnerability uncovered is another step towards safeguarding our government and teaches us critical new ways to improve our cybersecurity,” says Melissa Vice, VDP Interim Director, DC3.</p><p>For the DIB companies, the pilot offers a chance to harden their attack surface and be proactive in their security strategy.&nbsp;</p><p>With only three months left in the pilot, DC3 shared why new DIB companies are joining the pilot and hear why hackers are a critical partner for the DOD.&nbsp;</p>&nbsp;<p></p><p><strong>Defense Industrial Base companies:</strong> There are three months left to sign up for this added layer of defense. Don’t miss out on working with the best ethical hackers the world has to offer.&nbsp;</p><p><strong>Hackers</strong>: Bring your expertise to the US Government and the DIB-VDP Pilot to help ensure we’re guarding the most valued network information to the best of our ability. <a href="https://hackerone.com/dib-vdp-pilot?type=team" target="_blank">Join the DIB-VDP Pilot</a>.</p><p>—</p><p>Read more on the history of the DIB-VDP Pilot <a href="https://www.hackerone.com/customer-stories/dods-dib-vdp-pilot-hits-six-month-milestone" target="_blank">here</a>.&nbsp;</p><p>Click <a href="https://www.hackerone.com/product/response-vulnerability-disclosure-program" target="_blank">here</a> for more information about our <a href="https://www.hackerone.com/product/response-vulnerability-disclosure-program">Vulnerability Disclosure Program</a>.</p>
      
            
                                                                                <a href="https://www.hackerone.com/blog/customer-stories" hreflang="en">Customer Stories</a>
                    
    

            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-management" hreflang="en">Vulnerability Management</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-disclosure-program" hreflang="en">Vulnerability Disclosure Program</a>
        
    

            <p><span><span><span><span><span><span>With three months left in the 12-month pilot with the </span></span></span></span></span></span><a href="https://hackerone.com/dib-vdp-pilot?type=team" target="_blank">Department of Defense’s Defense Industrial Base Vulnerability Disclosure Pilot</a> (DOD DIB-VDP Pilot)<span><span><span><span><span><span>, HackerOne sat down with DC3 to discuss why new DIB companies are joining the pilot and hear why hackers are a critical partner for the DOD.</span></span></span></span></span></span></p>
      ]]></description>
  <pubDate>Fri, 28 Jan 2022 14:45:00 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5129 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>DOD's DIB-VDP Pilot Hits Six Month Milestone</title>
  <link>https://www.hackerone.com/blog/dods-dib-vdp-pilot-hits-six-month-milestone</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">DOD's DIB-VDP Pilot Hits Six Month Milestone</span>
    



    
        elizabeth@hackerone.com 
        
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Fri, 10/29/2021 - 11:00
</span>

            
  
      
  
    Image
                



          

  

      
            October 29th, 2021

      
            <h2><a href="https://www.hackerone.com/sites/default/files/inline-images/DIB%20VDP.jpg"></a></h2><p>&nbsp;</p><p>&nbsp;</p><p>Read more on this history of the DOD DIB-VDP pilot <a href="https://www.hackerone.com/vulnerability-management/60-days-insights-dods-defense-industrial-base-vulnerability-disclosure">here</a></p>
      
            
                                                                                <a href="https://www.hackerone.com/blog/customer-stories" hreflang="en">Customer Stories</a>
                    
    

            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-management" hreflang="en">Vulnerability Management</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-disclosure-program" hreflang="en">Vulnerability Disclosure Program</a>
        
    

            <p>Six months into the 12-month pilot with the<a href="https://hackerone.com/dib-vdp-pilot?type=team"> Department of Defense’s Defense Industrial Base Vulnerability Disclosure Pilot</a> (DOD DIB-VDP Pilot), HackerOne sat down with key stakeholders from the DIB-VDP Pilot to discuss the program’s success to date, the Federal Government’s strategy for working with hackers, and to hear about some of the most impactful vulnerabilities discovered to date.</p>
      ]]></description>
  <pubDate>Fri, 29 Oct 2021 16:00:00 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5114 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>The DOD Improves Their Security Posture Through the DIB-VDP</title>
  <link>https://www.hackerone.com/blog/dod-improves-their-security-posture-through-dib-vdp</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">The DOD Improves Their Security Posture Through the DIB-VDP</span>
    



    
        elizabeth@hackerone.com 
        
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Thu, 08/19/2021 - 17:29
</span>

            
  
      
  
    Image
                



          

  

      
            August 20th, 2021

      
            <p><strong>Who is DC3’s DCISE?</strong></p><p><strong>Krystal Covey: </strong>The Defense Collaborative Information Sharing Environment (DCISE) is the operational hub for the DOD’s DIB Cybersecurity (CS) Program offering no-cost cybersecurity services to Cleared Defense Contractors (CDCs). In addition, DCISE is currently piloting services to select non-CDCs.*&nbsp;</p><p><strong>What is the DIB Cybersecurity (CS) mission?&nbsp;</strong></p><p><strong>Krystal Covey: </strong>The mission of the DIB CS Program is to enhance and supplement the capabilities of Participants to safeguard DOD unclassified information that resides on or transits DIB unclassified information systems.</p><p><strong>How does DCISE support the DIB CS mission?</strong></p><p><strong>Krystal Covey: </strong>DCISE protects DOD information on DIB unclassified networks by fostering a collaborative information-sharing environment and delivering DIB-focused cybersecurity services and&nbsp;resources. DCISE is the conduit for reporting DIB cyber incidents to the DOD while simultaneously providing awareness across the US government of cybersecurity threats and trends that impact the DIB. DCISE develops and shares actionable threat products and performs cyber analysis, diagnostics, and consultation for the DIB.**&nbsp;</p><p><strong>How many DIB companies are part of the DIB CS Program?</strong></p><p><strong>Krystal Covey: </strong>We have 800+ Partners with signed Framework Agreements within the DIB CS Voluntary Program.&nbsp;</p><p><strong>What services does DCISE offer DIB Partners?</strong></p><p><strong>Krystal Covey: </strong>We&nbsp;offer&nbsp;various cyber threat products based on several sources, including Partner incident submissions, OSINT, DOD, and other USG reporting that provide a complete understanding of known or potential threats to unclassified DOD information on or transiting DIB systems and networks. Some statistics on DCISE analysis of nation-state Advanced Persistent Threat (APT) DIB cyber events since February 2008:</p><ul><li>Performed 76,628 hours of no-cost forensics and malware analysis</li><li>Published 12,362 cyber reports</li><li>Shared 507,483 actionable, non-attributional indicators</li></ul><p>DCISE service offerings include internal/external customer services, outreach, operational metrics, process improvement, quality assurance, quality control, and organizational training. DCISE builds and manages relationships with many DIB companies and USG stakeholders and drives special projects that improve customer experience. Outreach activities include web conferences, Technical Exchanges, Regional Partner Exchanges, virtual events, and facilitating Analyst-to-Analyst and Business-to-Business Exchanges.</p><p>Additionally, DCISE research supports DIB Partners in protecting DOD information through numerous services. These services are piloted to the DIB Partnership and range from services to technologies, and are intended to encompass all concepts, technologies, and processes related to cybersecurity.</p><p><strong>What are some of DCISE’s expanded pilots and services?</strong></p><p><em><strong>Cyber Resilience Analysis (CRA)</strong></em>: CRAs are holistic assessments of a company’s technical controls and processes, from how they keep their security controls updated to how they document the process. The assessment consists of more than 300 questions across ten&nbsp;security domains to assess a company’s cyber resilience.</p><p><em><strong>Adversary Emulation:</strong> </em>A form of penetration testing that not only uses a standard playbook but also leverages adversarial tactics, techniques, and procedures (TTPs) to test security controls. These adversarial TTPs are determined by identifying the most likely adversary to target a company based on the technology the company develops.</p><p><em><strong>Krystal Ball:</strong> </em>A tool that uses publicly available information to passively identify vulnerabilities that a DIB Partner has and the threats that may leverage those vulnerabilities. Since it is openly available, this is the same information that any adversary would be able to discover about the same company.</p><p><strong>Why is DCISE participating in the DIB-VDP Pilot?</strong></p><p><strong>Krystal Covey: </strong>There are thousands of CDCs that support the DOD, with varying sizes and resources. The DIB CS program has seen a steady increase of smaller companies that require added services to protect their assets. DCISE has resolved to grow with the Partnership and offer various solutions for its diverse DIB Partner makeup. The DIB-VDP Pilot is a great opportunity to demonstrate how DIB assets can be actively protected under a VDP.</p><p><strong>What are the benefits to the DCSA participants in the DIB-VDP Pilot?</strong></p><p><strong>Ashley Smith: </strong>DCSA benefits because companies participating in the pilot can learn about weaknesses in their networks and receive no-cost recommendations for correcting vulnerabilities.</p><p><strong>What if the system weakness or vulnerability is outside the scope and asset list provided?</strong></p><p><strong>Ashley Smith: </strong>If something outside the scope of the pilot is discovered, a DIB-VDP Pilot analyst will contact the participant to determine how they’d like to proceed. Participants have an option to expand their scope and asset list.</p><p><strong>Who can participate in the DIB-VDP Pilot program?&nbsp;</strong></p><p><strong>Ashley Smith: </strong>The DIB-VDP Pilot program is open to any organization, both cleared and unclear. ​​The Pilot Participation Request Form is <a href="https://www.dc3.mil/Organizations/Vulnerability-Disclosure/DIB-VDP-Pilot/">here</a>.&nbsp;</p><p><strong>Anything else you’d like to share?&nbsp;</strong></p><p><strong>Ashley Smith: </strong>One of the primary missions of&nbsp;DCSA is to provide critical technology protection to the DIB. Given the recent increase in cyber incidents affecting the DIB, DCSA views this pilot as a promising way to identify and stop attempts at stealing our Nation’s secrets.</p><p><em>*DCISE is also the reporting and analysis hub for the implementation of Title 10 USC Sections 391 and 393 regarding the reporting of certain types of cyber incidents by CDCs and the related Defense Federal Acquisition Regulation Supplement (DFARS 252.204- 7012).</em></p><p><em>**as outlined in Title 32 Code of Federal Regulations (CFR) Part 236, and serves as the single focal point for receiving all mandatory cyber incident reports affecting unclassified networks while protecting Controlled Unclassified Information (CUI) in accordance with the DFARS clause 252.204-7012.&nbsp;</em></p><p>Read <a href="https://www.hackerone.com/vulnerability-management/60-days-insights-dods-defense-industrial-base-vulnerability-disclosure">this blog</a> to see what happened in the first 60 days of&nbsp;the DIB-VDP Pilot.</p><p>--</p><p>To learn more about the benefits of a vulnerability disclosure program, check out&nbsp;<a href="https://www.hackerone.com/product/response-vulnerability-disclosure-program">HackerOne&nbsp;Response</a></p>
      
            
                                                                                <a href="https://www.hackerone.com/blog/customer-stories" hreflang="en">Customer Stories</a>
                    
    

            
            <a href="https://www.hackerone.com/blog/topic/application-security" hreflang="en">Application Security</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-management" hreflang="en">Vulnerability Management</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-disclosure-program" hreflang="en">Vulnerability Disclosure Program</a>
        
    

            <p><span><span><span><span><span><span>Four months into the&nbsp;12-month pilot, nearly 200 hackers within the Department of Defense’s Defense Industrial Base <a href="https://www.hackerone.com/product/response-vulnerability-disclosure-program">Vulnerability Disclosure Program</a> (<a href="https://hackerone.com/dib-vdp-pilot?type=team">DOD DIB-VDP</a>) have identified 649&nbsp;valid vulnerabilities. HackerOne recently sat down with <strong>Krystal Covey, DCISE Director,</strong> and <strong>Ashley Smith, DCSA Counterintelligence Directorate</strong>, to learn about their goals for engaging with hackers to improve national security. Read on to learn how the Defense Cyber Crime Center (DC3) and Defense Counterintelligence and Security Agency (DCSA) teams are improving the security of critical assets within DIB vendors and contractors and the mission that’s driving this program.&nbsp;</span></span></span></span></span></span></p>
      ]]></description>
  <pubDate>Thu, 19 Aug 2021 22:29:47 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5087 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>5 Learnings From A Conversation With OP Financial Group's CISO And @mrtuxracer</title>
  <link>https://www.hackerone.com/blog/5-learnings-conversation-op-financial-groups-ciso-and-mrtuxracer</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">5 Learnings From A Conversation With OP Financial Group's CISO And @mrtuxracer</span>
    



    
        H1 Team
        
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Wed, 01/27/2021 - 04:53
</span>

            
  
      
  
    Image
                



          

  

      
            January 27th, 2021

      
            <p>On 20 January, HackerOne’s CEO, Marten Mickos, sat down for a chat with European hacker, Julien Ahrens a.k.a @mrtuxracer, and Teemu Ylhäisi, CISO at OP Financial Group.&nbsp;</p><h3>Teemu Ylhäisi, CISO at OP Financial Group.&nbsp;</h3><p><em>OP Financial Group is one of the largest financial institutions in Finland. The group offers retail and commercial banking services as well as insurance services.</em></p><h3>Julien Ahrens a.k.a @mrtuxracer, hacker</h3><p><em>Julien is a full time hacker based in Northern Germany, Julien focuses his hacking efforts mainly on mid-sized&nbsp; companies, since he has strong beliefs about the importance of securing the sensitive data that such companies hold.He regularly blogs about his projects and is an advocate for increasing hacker-powered solutions in Germany.&nbsp;&nbsp;</em></p><p>The discussion ranged from the recent SolarWinds attacks to the best way to prevent phishing. Here are our top takeaways from the webinar:</p><p>&nbsp;</p><h2><strong>Transparency is the future of security</strong></h2><p>The old traditions of securing the corporate perimeter are no longer sufficient when the corporate network has now expanded to millions of domestic networks. We need new solutions, based on collaboration and transparency - after all, it is through sharing information that we can best prepare and protect against everything from software vulnerabilities to nation state actors.</p><p><strong>Teemu:</strong> “Transparency and trust are a key part of my philosophy. If your security team isn’t open with your organization then the company is not going to understand their worth. Our corporate culture values collaboration and in the Nordics there is a tradition of sharing information pertaining to security within the financial services industry. We all want to help make each other and our industry safer. I am very open with the business about what the security team is doing, and call out the business divisions that are supporting our overall security goal and initiatives. It spotlights our partners and introduces a little friendly competition between divisions.</p><p><strong>Julien:</strong> “When dealing with hackers, being transparent about your vulnerability management process goes a long way to build trust. I know many businesses are concerned about how much information they can share but hackers need to have enough details to be able to understand the process and the fix.”&nbsp;</p><p>&nbsp;</p><h2><strong>Security teams are rebranding as enablers&nbsp;</strong></h2><p>Security teams are increasingly recognising that encouragement and education are more effective at reducing risk and fostering collaboration than blocking projects or tools.</p><p><strong>Teemu:</strong> “I don’t want to be ‘Mr. No’. When I joined OP, I set the expectations that I would not be a blocker to innovation or people just doing their work. Working with developers and engineers to uncover security risk earlier in the SDLC is more powerful than banning a tool altogether. It might be more challenging, but the payoff is much higher for the organization. Everyone at OP&nbsp; is responsible for security, from the security team to the staff who diligently report phishing attacks.&nbsp;</p><p>&nbsp;</p><h2><strong>Speed is your best defense</strong></h2><p>It was universally agreed that humans are still the best mechanism for detecting security threats.</p><p><strong>Teemu:</strong> “I disagree with the idea that cyber criminals have to be successful just once, and defense teams have to be successful 100% of the time. Detection capability and speedy reaction to incidents is key. When a company is targeted by criminals, those criminals have to be successful in hiding every action; if defense notices a single aberration then they get the lead and can start to unravel the operation. The mean time for detecting breach is about 6 months to a year; this is too long, you need to detect it within hours and, if you have the ability to work with that time scale, then you’re in a good position.”</p><p><strong>Julien:</strong> “I’ve had experiences where I’ve been hacking on a program and their incident response teams have been tracking my actions in real time. There are always flaws in technical solutions that hackers can get around but if your defense teams are fast then they can make a hacker’s and, more importantly, an attacker’s life very difficult!”&nbsp;</p><p>&nbsp;</p><h2><strong>Disclosure culture is coming&nbsp;</strong></h2><p>The US government has already taken steps to mandate Vulnerability Disclosure Programs for federal agencies and our panellists think it’s only a matter of time before the trend spreads, despite resistance in conservative organizations.&nbsp;</p><p><strong>Julien: </strong>“The most ‘professional hackers’ are more likely to be attracted to bounty programs but VDP’s are a brilliant way to get reports on the things your security team doesn’t know about. However, there is still more education to be done in Europe. I know of an instance where a researcher had a legal case mounted because the company didn’t understand vulnerability disclosure and saw it as a threat. We’re the good guys so don’t scare us off!”</p><p><strong>Marten: </strong>“There is fear. But, with the <a href="https://www.hackerone.com/vulnerability-management/how-federal-agencies-use-vulnerability-disclosure-policies-level-security">U.S. mandating VDP for federal agencies</a> and European countries starting to suggest it as best practice, there will be a time in the near future when there will be overwhelming evidence of the benefits of responsible disclosure. And that’s when we’ll see the real shift in adoption.”&nbsp;</p><p>&nbsp;</p><h2><strong>Compliance needs hackers&nbsp;</strong></h2><p>Compliance and security don’t need to be mutually exclusive. If security reviews required for compliance are not actually spotlighting issues and improving security, then you aren't maximizing your impact.</p><p><strong>Teemu:</strong> “I know it’s something that really works for other organizations, so I’m planning to get to a point where we can demonstrate compliance for ongoing auditory compliance requirements by running an extensive bug bounty program. We already do pentesting and red team exercises but it is hard to cover everything and stay up to date. If we had a good group of trusted hackers on each system, each would get the attention it deserves and we would also be able to find out which applications have the most soft spots and so where to focus our efforts.</p><p>Listen back to the full conversation <a href="https://www.hackerone.com/resources/on-demand-videos/hacker-powered-security-predictions-for-2021">here.</a></p><p>&nbsp;</p>
      
            
                                                                                <a href="https://www.hackerone.com/blog/customer-stories" hreflang="en">Customer Stories</a>
                    
    

            
            <a href="https://www.hackerone.com/blog/topic/application-security" hreflang="en">Application Security</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-management" hreflang="en">Vulnerability Management</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-disclosure-program" hreflang="en">Vulnerability Disclosure Program</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/bug-bounty" hreflang="en">Bug Bounty</a>
        
    
]]></description>
  <pubDate>Wed, 27 Jan 2021 10:53:28 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5044 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>VDPs are at the Heart of the Australian Cyber Security Centre’s Recommendations</title>
  <link>https://www.hackerone.com/blog/vdps-are-heart-australian-cyber-security-centres-recommendations</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">VDPs are at the Heart of the Australian Cyber Security Centre’s Recommendations</span>
    



    
        H1 Team
        
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Tue, 12/08/2020 - 10:10
</span>

            
  
      
  
    Image
                



          

  

      
            December 8th, 2020

      
            <p>2020 has been an important year for VDP standardization worldwide. Earlier in the year, the U.S. saw the release of the Cybersecurity and Infrastructure Security Agency (CISA)’s Binding Operational Directive 20-01, NIST SP 800-53 Revision 5, and the Internet of Things Cybersecurity Bill, all of which positioned vulnerability disclosure policies (VDPs) as a crucial part of any cybersecurity strategy.</p><p>Now, the Australian Cyber Security Centre (ACSC) has released new guidelines recommending VDPs “to assist with the secure development and maintenance of products and services.” These guidelines were published in the <a href="https://www.cyber.gov.au/acsc/view-all-content/guidance/application-development"><em>Australian Government Information Security Manual</em></a>.</p><p>How does it impact your org? What does it mean for the future of cybersecurity? Here’s what you need to know.</p><p><strong>The Guidelines</strong></p><p>The ACSC manual covers everything from cybersecurity principles and roles to cable patching and media disposal. The section related to VDPs provides a background on the security benefits of working with external researchers. It also offers a guide to building your own VDP process to effectively “receive, verify, resolve and report on security vulnerabilities.”&nbsp;</p><p>ACSC, like <a href="https://www.hackerone.com/vulnerability-management/vulnerability-disclosure-policy-basics-5-critical-components">HackerOne</a>, recommends including the following information in every VDP:&nbsp;&nbsp;</p><ul><li>the purpose of the vulnerability disclosure program</li><li>the types of security research that are allowed</li><li>the types of security research that are not allowed</li><li>how to report potential security vulnerabilities</li><li>the actions that will be taken on receiving notification of potential security vulnerabilities and indicative timeframes for these actions</li><li>any expectations regarding the public disclosure of verified security vulnerabilities</li><li>any recognition finders of verified security vulnerabilities will receive</li></ul><p><strong>The Path Forward</strong></p><p>The ACSC has joined a legion of governments, agencies, and independent organizations recommending or mandating that businesses implement a VDP. However, many businesses have yet to heed these recommendations. According to our research, hackers often find bugs on organizations’ websites -- but 25% of the time, they have no channel for alerting the organization that the bug exists. Even more worrisome, <a href="https://www.hackerone.com/resources/reporting/the-4th-hacker-powered-security-report">82% of the Forbes Global 2000</a> do not have a known policy for vulnerability disclosure.&nbsp;</p><p>Organizations that do not have a VDP are missing out on crucial information about their own assets and systems. The bottom line is that all assets contain vulnerabilities, but only some businesses are taking the steps necessary to fix them.</p><p>It’s only a matter of time before every government mandates vulnerability disclosure policies. Fortunately, there is a clear path forward. HackerOne has partnered with organizations in every vertical to create a VDP that’s customized to their business. Rather than simply checking a compliance box, we help you integrate a potentially cumbersome, resource-draining process into your security strategy -- and turn compliance into a strategic differentiator.</p><p><a href="https://www.hackerone.com/product/response-vulnerability-disclosure-program">To get started, read more about HackerOne Response or chat with us today</a>.</p>
      

            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-management" hreflang="en">Vulnerability Management</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-disclosure-program" hreflang="en">Vulnerability Disclosure Program</a>
        
    
]]></description>
  <pubDate>Tue, 08 Dec 2020 16:10:31 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5031 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Adobe and HackerOne Celebrate Five Years of Continued Collaboration</title>
  <link>https://www.hackerone.com/blog/adobe-and-hackerone-celebrate-five-years-continued-collaboration</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Adobe and HackerOne Celebrate Five Years of Continued Collaboration</span>
    



    
        H1 Team
        
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Wed, 08/12/2020 - 09:38
</span>

            
  
      
  
    Image
                



          

  

      
            August 12th, 2020

      
            <p>Adobe, best known for its multimedia and creativity software product line, serves millions of customers globally who trust them to deliver secure products and services. With a commitment to keeping their customer’s data and experience safe, Adobe first launched their Vulnerability Disclosure Program with HackerOne in 2015. Since then, the team has continued to expand its program to improve security across its suite of products.&nbsp;</p><p>To celebrate five years with HackerOne, we sat down with Adobe’s Senior Security Program Manager Pieter Ockers to discuss how their program has evolved over the last five years and the role that hacker-powered security, both bug bounties and response programs, plays into their overall security strategy.&nbsp;</p><p><strong>Q. How do ethical hackers fit into Adobe’s comprehensive security strategy? &nbsp;</strong><br><strong>A: </strong>Adobe’s primary security priority is to help keep our customer’s data and experiences safe. We do this by building security into our product development and operational processes at the onset, and automating as many processes as possible. One of the main goals for the security team is to make secure development and operations as easy as possible for product teams and the company. Through our vulnerability disclosure program, primarily hosted on HackerOne, and regular penetration tests, the ethical hacker community helps augment our security team by enabling us to open up our products and services for review by a diverse population of security experts with many different perspectives and backgrounds. We think this added level of expertise and perspective helps us make our products better and safer for our users.</p><p><strong>Q. Can you share a little bit about why you chose HackerOne?&nbsp;</strong><br><strong>A: </strong>Our initial motivation to use HackerOne’s platform was driven by the desire to migrate away from the previous vulnerability submission workflow. At the time, we were using a legacy web form to receive vulnerability submissions. This technology lacked many of the features that the HackerOne platform offered. We found HackerOne’s platform was best optimized for engagement with security researchers, and it was an easy decision to adopt their platform to execute on this program.</p><p>Once on the platform, we were able to scale our Product Security Incident Response Team (PSIRT) by using HackerOne’s triage services to better manage the increasing volume of bug submissions. Over time, we have also implemented incremental improvements through leveraging HackerOne’s API, integrating the platform into Adobe’s workflows. This allowed us to scale our vulnerability disclosure program along with the growth of Adobe.</p><p><strong>Q. Adobe leverages hacker-powered security and the hacker community in a few different ways to satisfy various security needs. How has Adobe scaled and evolved programs over the years?</strong><br><strong>A: </strong>Adobe interfaces with the security community through a spectrum of engagement models, including (but not limited to):</p><ul><li>Vulnerability Disclosure Program&nbsp;</li><li>Crowdsourced Pentests</li><li>Magento Bug Bounty Program</li></ul><p><strong>Code reviews and pentests</strong><br>Before Adobe introduces a major upgrade or new product, feature or online service offering, a code review and pentest is often performed by an external vendor. These traditional third-party reviews provide an additional layer of assurance to complement our internal security assessments and static code analysis that are part of our Secure Product Lifecycle (SPLC).<br>&nbsp;<br><strong>Vulnerability Disclosure Program&nbsp;</strong><br>PSIRT is responsible for Adobe’s vulnerability disclosure program, and typically responds first to the security community’s submissions of vulnerabilities related to Adobe products, online services or web properties. Adobe launched its vulnerability disclosure program on HackerOne in August 2015. The HackerOne platform leveraged by Adobe offers researchers the opportunity to build a reputation and learn from others in the community, all while allowing Adobe to streamline workflows and scale resources establishing a single intake channel for vulnerabilities.&nbsp;<br>&nbsp;<br><strong>Crowdsourced pentests&nbsp;</strong><br>To benefit from a larger pool of security researchers, Adobe also uses crowdsourced pentests in tightly scoped, time-bound engagements involving an elite pool of pentesters targeting a single service offering or web application. This approach has helped supplement the traditional pentests against our online services by increasing code coverage and testing techniques.&nbsp;</p><p><strong>Magento Bug Bounty Program</strong><br>Adobe acquired Magento in 2018, and migrated its bug bounty program to HackerOne in early 2019. Our primary goal for this bounty program is to incentivize researchers to find and report bugs that represent systemic risks with the platform, and this program has successfully captured the expertise of the Magento community to help us harden the Magento platform.&nbsp;</p><p><strong>Q. Measuring the success of hacker-powered security can be tough as you’re often trying to measure what doesn’t happen. How do you measure return on investment of your security initiatives?&nbsp;</strong><br><strong>A. </strong>Our customers expect to have a secure experience when using Adobe products and services, and investing in our security initiatives allows us to better serve our customers. For PSIRT initiatives we make every effort to keep our products safe and our customers happy. We strive to provide transparency and quick, helpful responses to external researchers, while keeping a pulse on media and social sentiment.</p><p><strong>Q. What advice or lessons learned would you share for companies looking to consolidate vendors and scale their programs?&nbsp;</strong><br><strong>A.</strong> The key to a successful experience with the security research community is to start a vulnerability disclosure program with limited scope. Researchers expect, as they should, that vendors answer questions and react to submissions promptly. Launching a program before you have the capacity to handle the submissions could result in a poor experience for external researchers.&nbsp;</p><p>Once you have developed and tested your playbooks with a limited vulnerability disclosure program, you can expand incrementally to bigger and broader scoped programs seamlessly. &nbsp;</p><p><strong>Q. Looking forward to the next five years, how do you see hacker-powered security and the industry more broadly evolving?</strong><br><strong>A.</strong> I believe this rapid shift to working remotely will open up more opportunities for remote, crowdsourced workers to play an even bigger role in contributing to the development of secure software.<br>I am optimistic that as the hacker and research community continues to grow in size and skill, they will surface complex vulnerabilities faster than any automated tool could (as well as continuing to proactively offer advice to developers and companies).&nbsp;&nbsp;</p><p>To learn more about the Adobe program and get hacking, visit<br><a href="https://hackerone.com/adobe">https://hackerone.com/adobe</a>.<br>&nbsp;</p>
      
            
                                                                                <a href="https://www.hackerone.com/blog/customer-stories" hreflang="en">Customer Stories</a>, 
                                                                                <a href="https://www.hackerone.com/blog/news-updates" hreflang="en">News &amp; Updates</a>
                    
    

            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-disclosure-program" hreflang="en">Vulnerability Disclosure Program</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/bug-bounty" hreflang="en">Bug Bounty</a>
        
    
]]></description>
  <pubDate>Wed, 12 Aug 2020 14:38:10 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">4989 at https://www.hackerone.com</guid>
    </item>

  </channel>
</rss>
