HackerOne is a vulnerability coordination and bug bounty platform that connects businesses with cybersecurity researchers. It is one of the first companies to embrace and utilize crowd-sourced security and hackers as linchpins of its business model, and is the largest cybersecurity firm of its kind. As of February 2017, HackerOne's network consisted of approximately 100,000 hackers and had paid $14 million in bounties.

Wikipedia
HackerOne
HackerOne
Blog Post
  • We recently held an Ask Me Anything with the co-authors of The CERT Guide to Coordinated Vulnerability Disclosure (CVD). The CERT Coordination Center’s Allen D. Householder, Threat Ecosystem Analysis Team Lead, and Art Manion, Vulnerability Analysis Technical Manager, shared their thoughts on the creation of their guide as well as many of the specific points within the guide.

HackerOne
HackerOne
Blog Post
  • In the League of Legends world, your nexus is protected from outside threats by a strong team of diverse champions. It’s similar to how you should approach security in the real world, and wouldn’t it be better to have more and better champions working on your team?

HackerOne
HackerOne
Blog Post
  • Before you propose a bug bounty program to your organization, you need a comprehensive plan. That’s just one of the many takeaways offered on a recent podcast from KPMG’s Advisory Institute, which publishes content related to business performance, technology, risk management, and more.

HackerOne
HackerOne
SlideShare Presentation
  • What companies have paid the most in bug bounties to date Highest paid bounties and average bounty amount across top programs How long it takes to respond, pay, and respond to reported vulnerabilities Top hackers average number of hackers that have reported bugs across each program

HackerOne
HackerOne
Blog Post
  • The United Kingdom’s Information Commissioner’s Office suggested “12 steps to take now” to get ahead of GDPR’s impact on your operations and processes. We’ve put together a quick recap available on our resources page.

HackerOne
HackerOne
Blog Post
  • Data breaches in information security have become an inescapable reality. A common inquiry we receive here at HackerOne is for guidance on how to most effectively respond to one of these unfortunate incidents. There are no easy answers. Our hope is the following guidance can serve as recommendations for any victim of a breach.

HackerOne
HackerOne
YouTube Video
  • Join HackerOne along with Allen D. Householder and Art Manion, co-authors of the 121 page CERT® Guide to Coordinated Vulnerability Disclosure, for an Ask Me Anything session around their research and thoughts on vulnerability disclosure. Get the “between the lines” insights as we walk through the principles of coordinated vulnerability disclosure as outlined in the guide.

HackerOne
HackerOne
Blog Post
  • The attention being given to vulnerability disclosure policies (VDP) in the past year has increased dramatically. It might be the latest high-profile breach that sparks a comment, but more and more, it’s the attitude that VDPs aren’t just nice-to-haves, they’re critical tools for every cyber security team.

HackerOne
HackerOne
SlideShare Presentation
  • Recommendations from The United Kingdom's Information Commissioner's Office (ICO) to Prepare for May 2018. The European General Data Protection Regulation, better known as GDPR, will take effect on May 25, 2018. When it does, every business, organization, or government agency that collects information on European Union (EU) citizens (in other words, just about everyone) will be forced to radical...

HackerOne
HackerOne
Blog Post
  • There are only five days left to Hack The World 2017 and earn the title! Now is the time to find some serious  bugs and earn your spot at the top of our leaderboard!

HackerOne
HackerOne
Blog Post
HackerOne
HackerOne
Blog Post
  • Great news for U.S. citizens! Over 3,000 valid security vulnerabilities have been resolved with the U.S. Department of Defense’s “Hack the Pentagon” hacker-powered security program.

HackerOne
HackerOne
Blog Post
  • Traditional pen tests can be expensive, especially those that produce low-hanging fruit results. And even more painful when you pay the same price tag for the low-value pen test report as the report revealing multiple critical vulnerabilities. With hacker-powered penetration testing, on the other hand you tap into more of the best talent, without a huge initial price tag.

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.