Image Vulnerability Management Zoom and Salesforce: The Role of Hackers in Addressing Security Challenges July 25th, 2023 “You can’t find everything, and it’s crucial to leverage the best talent where you can find it,” says Michael Adams, Chief Information Security Officer at Zoom. Read Now
Image Best Practices Vulnerability Management Five Takeaways from Ohio Secretary of State's VDP Success Story July 18th, 2023 Recently, Ohio Secretary of State Chief Information Security Officer Jillian Burner, and HackerOne Co-founder and... Read Now
Image Vulnerability Management Security Should Never Sleep: Adopting Continuous Testing for Evolving Threats July 18th, 2023 Creating Continuous Attack Resistance In order to stay ahead of cybercriminals, businesses need to preemptively... Read Now
Image Vulnerability Management GUEST BLOG: Vulnerability Disclosure Adoption In The Consumer IoT space Is Lagging, But What About Elsewhere? May 19th, 2023 There is a lot of focus, rightly so, on the consumer IoT space. We have... Read Now
Image Vulnerability Management From HackerOne's Former CEO Prove Your Worth: How to Measure Cybersecurity ROI and Impress Your Board May 9th, 2023 Across the board, companies face headcount and budget cuts, and security teams must do more with less. Read Now
Image Application Security Vulnerability Management Penetration Testing 100 Conversations with Start-up Security Leaders April 11th, 2023 1. Why are run-of-the-mill, traditional pentests not delivering effective results? Time and time again, I... Read Now
Image Vulnerability Management Level Up Your Bug Bounty Effectiveness, Part II: Operational Areas to Continuously Improve March 14th, 2023 Hacker Engagement First impressions matter! Win hackers over early on and create “anchor” hackers -... Read Now
Image Vulnerability Management Level Up Your Bug Bounty Effectiveness: 3 Keys to Launch a Successful Program February 23rd, 2023 With this two-part blog series, we will delve into strategies and tactics exhibited by dozens... Read Now
Image Application Security Vulnerability Management Outsmart Cybercriminals with Proactive Attack Surface Management (ASM) February 7th, 2023 Why is ASM Important? Your attack surface is the sum of all entry points an... Read Now