Image Best Practices Penetration Testing Bug Bounty Jedox’s Journey with HackerOne: A Q&A with CTO, Vladislav Maličević October 28th, 2021 *Editor's note: A security researcher is anyone who investigates a potential security issue in some... Read Now
Image Best Practices Vulnerability Management Bug Bounty Hyatt's Bug Bounty Program Update: Q&A with Senior Analyst Robert Lowery August 18th, 2021 Q: Tell us who you are. I'm Robert Lowery, Senior Analyst at Hyatt. I'm part... Read Now
Image Best Practices Vulnerability Management One Month of Learnings from Flo Health’s Bug Bounty Program: A Q&A with CISO, Leo Cunningham August 4th, 2021 The CISO of Flo Health, the world’s most popular women’s health app, knows that enabling... Read Now
Image Best Practices Vulnerability Management Bug Bounty Citrix's Hacker-Powered Security Growth Plan: Q&A with Abhijith Chandrashekar June 16th, 2021 With over 400,000 customers, Citrix is a recognized industry leader in both digital workspace technology... Read Now
Image Best Practices A Security Engineer and Hacker Share Their Experiences with Security Assessments May 3rd, 2021 App Security is More Vital than Ever The number of apps that organizations and individuals... Read Now
Image Best Practices Vulnerability Management How HackerOne Helps the Vulnerability Management Process April 29th, 2021 How HackerOne Helps the Vulnerability Management Process HackerOne sees vulnerability management as a process combining... Read Now
Image Best Practices Application Security What Years of AWS Hacking Tells Us About Building Secure Apps January 12th, 2021 Imagine being part of an organization that has a security team that manages risks by... Read Now
Image Best Practices Application Security Bug Bounty Quantifying Risk: How do you measure success in security? December 10th, 2020 Every quarter, a CISO has to stand up in front of their leadership and attempt... Read Now
Image Best Practices Cybersecurity Vendor Consolidation: Securing More with Less July 21st, 2020 Remember those days, pre-pandemic, when you thought your security scope was complex? But now, with... Read Now