Image Vulnerability Management Beyond a VDP: How a Challenge Brings Proactive Security to Your Agency January 31st, 2023 Vulnerability Disclosure Programs create an effective means for researchers and other users to report discovered... Read Now
Image Vulnerability Management Introducing Program Levels: Hacker-friendly Practices that Improve Program Results November 16th, 2022 One of the most important lessons we have learned is that organizations with the most... Read Now
Application Security Vulnerability Management Penetration Testing Introducing Unified HackerOne Scope Management with Burp Suite Support September 15th, 2022 This post will start with the basics of defining scope and how ethical hackers and... Read Now
Image Vulnerability Management Penetration Testing Benchmark Analysis: Annual Pentest and Code Review Coverage July 14th, 2022 How many annual pentests, code reviews, SAST/DAST scans should your organization conduct? Read Now
Image Vulnerability Management 5 Articles to Get You Up-to-Speed on Bug Bounty Programs July 7th, 2022 This article shares five valuable resources about bug bounty programs, why they are useful, how... Read Now
Image Application Security Vulnerability Management Security Highlights: New CWE Rankings, Software Supply Chains, and Side-Channel Attacks July 5th, 2022 MITRE Releases 2022 CWE Top 25 The popular CWE Top 25 list, which ranks the... Read Now
Image Vulnerability Management How Bug Bounty Uncovered A 5-Year-Old Vulnerability In Hours June 16th, 2022 When PullRequest was acquired, these concerns became HackerOne’s challenges. When we finalized the acquisition, we... Read Now
Image Vulnerability Management CISOs: Do You Know the Security Risks of Your Organization's Next M&A? June 14th, 2022 First, I will discuss the inherent risks associated with M&As as attack surfaces grow. A... Read Now
Image Vulnerability Management How to Catch Injection Security Vulnerabilities in Code Review June 9th, 2022 Understanding Injection Vulnerabilities Injection vulnerabilities exist when information provided by users of the application is... Read Now