Category: Mix

Hackerone logo
30
Jan
2025

FDA’s New Cybersecurity Requirements: Are You Prepared as a Medical Device Manufacturer?

Where To Begin? Companies submitting products for FDA approval must do the following: Provide details of their process to monitor,…

Hackerone logo
30
Jan
2025

Decoding the HackerOne Code of Conduct

When hackers participate in programs on the HackerOne platform, they agree to help empower our community by following the HackerOne…

Investing in the security researcher community for shared success
30
Jan
2025

Investing in the security researcher community for shared success

Our researcher community is the beating heart of our bug bounty platform, identifying hard-to-find vulnerabilities and improving security for our…

Hackerone logo
30
Jan
2025

GUEST BLOG: Vulnerability Disclosure Adoption In The Consumer IoT space Is Lagging, But What About Elsewhere?

There is a lot of focus, rightly so, on the consumer IoT space. We have had a lot of incidents…

Apple's Big AI Jump | Daniel Miessler
30
Jan
2025

Apple’s Big AI Jump | Daniel Miessler

How Apple will go from the worst AI to the best Apple’s about to go from having the worst AI…

Hackerone logo
30
Jan
2025

GUEST BLOG: Governments Across The World Are Mandating Vulnerability Disclosure So Why Are Companies Sitting On Their Hands?

The IoT Security Foundation’s fifth annual report into the state of vulnerability disclosure consumer Internet of Things, produced by Copper…

Hackerone logo
30
Jan
2025

A Year In HackerOne’s Bug Bounty Program

Hackers Report The Most Vulnerabilities In 2022 To Keep The Platform Secure We looked at how our program performed from…

Hackerone logo
30
Jan
2025

Improve DevOps Security With Code Security Audit

Use Code Security Audit for DevOps DevOps teams may care about security, but it is not their area of expertise…

Hackerone logo
30
Jan
2025

Seven Essential Components Of A Top-Tier Attack Surface Management Program

    1. Discover and Import  Maintaining an up-to-date inventory of all your internet-facing assets is crucial for effective risk…

Hackerone logo
30
Jan
2025

Grammarly CISO Suha Can Discusses the Impact of Preemptive Security with HackerOne

The allure of generative AI and the importance of the basics. While the advent of generative AI poses new challenges,…

AI Novels
30
Jan
2025

AI Novels Are Coming | Daniel Miessler

It’s about to get a lot easier to write a decent novel. I’d guess that within 1-3 years, being an…

Hackerone logo
30
Jan
2025

Takeaways from a Conversation Between Hackers and Program Managers

In our web event “Getting Vulnerable”, we brought together program managers Jill Moné-Corallo from GitHub, Garrett McNamara from ServiceNow, and…