How REI Strengthens Security with HackerOne’s Global Security Researcher Community
Q: Please introduce yourself. Tell us what you do at REI and why cybersecurity is important to REI. A: I’m Isaiah Grigsby, a senior application…
Q: Please introduce yourself. Tell us what you do at REI and why cybersecurity is important to REI. A: I’m Isaiah Grigsby, a senior application…
This year, we launched new initiatives designed to bring people together in fun and innovative ways, including playing online games, monthly global fitness challenges, and…
Many Facets, One Goal A common trope in cybersecurity is “don’t roll your own auth.” There’s a reason for this: implementing authentication is deceptively difficult. Many…
This blog will break down the NIS2 Directive drawing information from the original directive briefing published by the European Parliament and explain how organizations can…
Retail and e-commerce organizations are major targets this time of year, which is why proactive security testing is essential to preparing for a potential onslaught…
1. Are You Prepared to Manage Incoming Vulnerability Reports? Naturally, the purpose of running a bug bounty program is to identify vulnerabilities beyond what your…
Transforming Security Program Management: A Day with Hai Picture this: It’s Monday morning, and your dashboard shows fifteen new vulnerability reports from the weekend. Your…
Employees at HackerOne utilize the Working Genius model, which provides individuals and teams with a straightforward, practical, and effective framework for leveraging each other’s natural…
When Saskia joined the tech world, she didn’t follow the conventional path of computer science degrees or coding boot camps. Instead, her journey was shaped…
Earlier this year, the Office of Management and Budget (OMB), which establishes budget rules for federal agencies, issued a memorandum on Advancing the Responsible Acquisition of…
Q: Why did Deribit launch a bug bounty program? A: I like to view security as an onion where each additional layer provides additional protection…
Since then, we’ve grown the program, collaborated with HackerOne, and built partnerships within the bug bounty community. The valuable insights we’ve gained from security researchers…