Category: Mix

Hackerone logo
30
Jan
2025

GUEST BLOG: Governments Across The World Are Mandating Vulnerability Disclosure So Why Are Companies Sitting On Their Hands?

The IoT Security Foundation’s fifth annual report into the state of vulnerability disclosure consumer Internet of Things, produced by Copper…

Hackerone logo
30
Jan
2025

A Year In HackerOne’s Bug Bounty Program

Hackers Report The Most Vulnerabilities In 2022 To Keep The Platform Secure We looked at how our program performed from…

Hackerone logo
30
Jan
2025

Improve DevOps Security With Code Security Audit

Use Code Security Audit for DevOps DevOps teams may care about security, but it is not their area of expertise…

Hackerone logo
30
Jan
2025

Seven Essential Components Of A Top-Tier Attack Surface Management Program

    1. Discover and Import  Maintaining an up-to-date inventory of all your internet-facing assets is crucial for effective risk…

Hackerone logo
30
Jan
2025

Grammarly CISO Suha Can Discusses the Impact of Preemptive Security with HackerOne

The allure of generative AI and the importance of the basics. While the advent of generative AI poses new challenges,…

AI Novels
30
Jan
2025

AI Novels Are Coming | Daniel Miessler

It’s about to get a lot easier to write a decent novel. I’d guess that within 1-3 years, being an…

Hackerone logo
30
Jan
2025

Takeaways from a Conversation Between Hackers and Program Managers

In our web event “Getting Vulnerable”, we brought together program managers Jill Moné-Corallo from GitHub, Garrett McNamara from ServiceNow, and…

Hackerone logo
30
Jan
2025

The Future of Generative AI and Security [2 Predictions]

Offensive AI Will Outpace Defensive AI In the short term, and possibly indefinitely, we will see offensive or malicious AI…

Hackerone logo
30
Jan
2025

Manage Your Attack Surface With Continuous Security Testing

Creating Continuous Attack Resistance  In order to stay ahead of cybercriminals, businesses need to preemptively find flaws in their digital…

Hackerone logo
30
Jan
2025

Five Takeaways from Ohio Secretary of State’s VDP Success Story

Recently, Ohio Secretary of State Chief Information Security Officer Jillian Burner, and HackerOne Co-founder and Head of Professional Services, Michiel…

Hackerone logo
29
Jan
2025

Ethical Hackers and Bug Bounty Programs

This is where ethical hackers come in. During a recent panel at Infosecurity Europe, we heard from security professionals at…

API Security Is At the Center of OpenAI vs. DeepSeek Allegations -
29
Jan
2025

API Security Is At the Center of OpenAI vs. DeepSeek Allegations –

With a high-stakes battle between OpenAI and its alleged Chinese rival, DeepSeek, API security was catapulted to priority number one…