HackerOne is a vulnerability coordination and bug bounty platform that connects businesses with cybersecurity researchers. It is one of the first companies to embrace and utilize crowd-sourced security and hackers as linchpins of its business model, and is the largest cybersecurity firm of its kind. As of February 2017, HackerOne's network consisted of approximately 100,000 hackers and had paid $14 million in bounties.

Wikipedia
HackerOne
HackerOne
Blog Post
  • Next week we’re kicking off our first conference by and for the hacker-powered security industry. On Tuesday, October 24, 2017, Security@ San Francisco will gather more than 200 security leaders, hackers and industry experts for groundbreaking keynotes, presentations and networking with peers and industry leaders who are paving the way to a safer internet.

HackerOne
HackerOne
Blog Post
  • The European General Data Protection Regulation, better known as GDPR, will take effect on May 25, 2018 and it will radically change how your business manages customer data and security. Read the high-level GDPR info you need to know including three key provisions in GDPR related to security and vulnerability testing.

HackerOne
HackerOne
Blog Post
  • After the success of Hack The World 2016, we’re bringing back our annual hacking competition and, thanks to your feedback, have made some great improvements to make it even better than last year.

HackerOne
HackerOne
YouTube Video
  • Watch this webinar to learn how to get around misguided thinking that leads to executive under investment in cyber security, and secure the resources you need. You'll learn how to: - Work around CEO and CFO human biases - Motivate decision makers to invest more in cyber infrastructure - Replace your CEO’s mental model with new success metrics - Compare your company’s performance with similar firm...

HackerOne
HackerOne
SlideShare Presentation
  • Learn how to get around misguided thinking that leads to executive under investment in cyber security, and secure the resources you need. You'll learn how to: - Work around CEO and CFO human biases - Motivate decision makers to invest more in cyber infrastructure - Replace your CEO’s mental model with new success metrics - Compare your company’s performance with similar firms to overcome executi...

HackerOne
HackerOne
Blog Post
  • Open source powers our platform, our community, and is the underpinning of our entire connected society. Node.js developers build the web applications that are responsible for the foundation of our connected world. Because of this, we have a responsibility to help them grow their community, while also empowering them to be more secure.

HackerOne
HackerOne
Blog Post
  • Is the ecommerce and retail industry a pioneer or a laggard in using hacker-powered efforts in the fight against cyber criminals? And how does your retail company stack up against others in the industry? Find out with this new report, specifically for the ecommerce and retail industry, and using data culled from more than 800 hacker-powered security programs, over $20 million in awarded bounties, ...

HackerOne
HackerOne
Blog Post
  • David Brisson of Tripwire recently published a list of the 10 essential bug bounty programs of 2017. Half of the companies included on that list manage their vulnerability disclosure programs through HackerOne. Taking note of this, David sat down with HackerOne CEO, Mårten Mickos, to discuss trends in the security industry, thoughts on bug bounty programs, and why companies turn to HackerOne. We’v...

HackerOne
HackerOne
Blog Post
  • Twenty-one years old. Full-time college student. Mountain biker. Bounty hunter. That’s Gerben Janssen van Doorn, who goes by Gerben_Javado and is ranked ninth on HackerOne’s hacker reputation. He’s found more than 400 bugs and made $2,000 in the past month alone (and that’s just on public bugs).

HackerOne
HackerOne
Blog Post
  • From smart refrigerators in your kitchen to cardiac monitors in a hospital, Qualcomm’s processors, modems, and other wireless technologies are powering the world of connected devices. But as the number of those devices continues to explode—to as many as 20 billion by 2020—the focus on security becomes more prominent.

HackerOne
HackerOne
Blog Post
  • You’ve probably heard of GitHub, but you might not know they support more than 20 million people learning, sharing, and working together on more than 55 million projects. Yeah, that’s a lot...and a lot of responsibility on GitHub’s part to ensure the safety and security of their customers’ data.

HackerOne
HackerOne
Blog Post
  • Who are these white hat hackers that are reporting vulnerabilities to companies? HackerOne created the 2016 Bug Bounty Hacker Report to share insights about the hacker community and to give hackers the exposure deserved as vital actors in our modern digital society.

HackerOne
HackerOne
SlideShare Presentation
  • Scott Crawford, Research Director of Information Security at 451 Research, shares: Why having a Vulnerability Disclosure Policy is now “table stakes” The what, how and why of Vulnerability Disclosure Policy documentation Tangible benefits and tradeoffs of incorporating bug bounties into software development How bug bounties make for a more secure software development lifecycle

HackerOne
HackerOne
YouTube Video
  • Scott Crawford, Research Director of Information Security at 451 Research, shares: Why having a Vulnerability Disclosure Policy is now “table stakes” The what, how and why of Vulnerability Disclosure Policy documentation Tangible benefits and tradeoffs of incorporating bug bounties into software development How bug bounties make for a more secure software development lifecycle

HackerOne
HackerOne
SlideShare Presentation
  • 451 Research, a preeminent information technology research and advisory company, recently released a Pathfinder Report titled “Bug Bounties and the Path to Secure Software.” The report explores the role of bug bounties and vulnerability disclosure policies (VDP) to create consistency, resiliency, and efficiency in software and development practices, and dives into the key elements to consider whe...

HackerOne
HackerOne
SlideShare Presentation
  • Vulnerability disclosure and hacker-powered security cannot be ignored. In July 2017, the Dept of Justice issued a framework for organizations looking to implement vulnerability disclosure programs. On August 2, 2017, two U.S. lawmakers introduced a bill that would require vulnerability disclosure policies for all IoT devices. And those are just the two most recent examples. Guidance on...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.