Category: Mix

Hackerone logo
15
Oct
2024

Measure Your AI Risk Preparedness with This Interactive Self-Assessment Tool

Effectively managing these risks requires human expertise and strategic oversight. That’s where the AI Risk Readiness Self-Assessment Tool comes in —…

Hackerone logo
15
Oct
2024

European Council Adopts Cyber Resilience Act

The CRA will be a game-changing regulation for software and connected product security. The CRA imposes cybersecurity requirements for manufacturers…

Hackerone logo
15
Oct
2024

How To Use HackerOne’s Global Vulnerability Policy Map

To help organizations keep up with the shifting landscape of VDP mandates and recommendations, HackerOne has developed the Global Vulnerability…

Get to know our new Domains page
14
Oct
2024

Get to know our new Domains page

Earlier this year, we launched a new Domains page to give you more powerful and flexible attack surface insights. When…

How to Use Hugging Face Models with Ollama
10
Oct
2024

How to Use Hugging Face Models with Ollama

Ollama is one of my favorite ways to experiment with local AI models. It’s a CLI that also runs an…

Hackerone logo
10
Oct
2024

The Recruitment Process: What to Expect When You Apply at HackerOne

If you’re considering applying, here’s a look at what you can expect from the process, from the initial application to…

Hackerone logo
09
Oct
2024

How an IDOR Vulnerability Led to User Profile Modification

According to the 7th Annual Hacker-Powered Security Report, IDOR makes up 7% of the vulnerabilities reported via the HackerOne platform. Government…

Choosing the Right Deployment Option for Your API Security Solution
09
Oct
2024

Choosing the Right Deployment Option for Your API Security Solution

You need an API security solution. That much is a given (although some may argue it isn’t!). While essential for…

How My Projects Fit Together
07
Oct
2024

How My Projects Fit Together

When people look at the various projects I’ve put out over the last year, they often ask which is the…

Automate Your iPhone's Volume Control
07
Oct
2024

Automate Your iPhone’s Volume Control

Today, I’m going to share a quick automation trick that will save your eardrums and maybe even your sanity. The…

The power of cyber threat analysis 
05
Oct
2024

The power of cyber threat analysis 

Cybersecurity is not just an IT concern, but a business imperative. Cyber threats pose significant financial, reputational, and legal risks….

All in on flexible and efficient integrations
04
Oct
2024

All in on flexible and efficient integrations

Our users secure products and services developed by dozens of distributed technical teams. They rely on tools like Detectify to…