Category: Mix

Hackerone logo
26
Jan
2025

HackerOne’s Fall Day of Service

Employees had the chance to connect over shared goals and values, fostering stronger relationships beyond the workplace. This event generated…

Hackerone logo
26
Jan
2025

AI in SecOps: How AI is Impacting Red and Blue Team Operations

Integrating AI into SOCs The integration of AI into security operations centers (SOCs) and its impact on the workforce are…

Hackerone logo
26
Jan
2025

Flexible Data Retrieval at Scale with HAQL

What is HAQL? Back in 2022, we were faced with a challenge: we wanted to build useful, actionable dashboards for…

Hackerone logo
26
Jan
2025

How REI Strengthens Security with HackerOne’s Global Security Researcher Community

Q: Please introduce yourself. Tell us what you do at REI and why cybersecurity is important to REI. A: I’m…

Hackerone logo
26
Jan
2025

How HackerOne Employees Stay Connected and Have Fun

This year, we launched new initiatives designed to bring people together in fun and innovative ways, including playing online games,…

Hackerone logo
26
Jan
2025

How an MFA Bypass Led to Account Takeover [Plus 11 Authentication Tips]

Many Facets, One Goal A common trope in cybersecurity is “don’t roll your own auth.” There’s a reason for this: implementing…

Hackerone logo
25
Jan
2025

5 Insights Attendees Gained from the Security@ World Tour

If you weren’t lucky enough to catch us at a roadshow event, you’ll be delighted to know you can catch…

Hackerone logo
25
Jan
2025

Network and Information Systems Directive (NIS2) Compliance: What You Need to Know

This blog will break down the NIS2 Directive drawing information from the original directive briefing published by the European Parliament…

Hackerone logo
25
Jan
2025

Why Retail and E-commerce Organizations Trust Security Researchers During the Holiday Shopping Season

Retail and e-commerce organizations are major targets this time of year, which is why proactive security testing is essential to…

Hackerone logo
25
Jan
2025

Is Your Security Ready For Bug Bounty? [5 Questions]

1. Are You Prepared to Manage Incoming Vulnerability Reports? Naturally, the purpose of running a bug bounty program is to…

Hackerone logo
25
Jan
2025

Hai’s Latest Evolution: Intelligence, Context, and More Intuitive UX

Transforming Security Program Management: A Day with Hai Picture this: It’s Monday morning, and your dashboard shows fifteen new vulnerability…

Hackerone logo
25
Jan
2025

Harnessing the Working Genius for Team Success

Employees at HackerOne utilize the Working Genius model, which provides individuals and teams with a straightforward, practical, and effective framework…