Security
AMA with Authors of The CERT Guide to Coordinated Vulnerability Disclosure
HackerOne welcomes Allen D. Householder and Art Manion, co-authors of the 121 page CERT® Guide to Coordinated Vulnerability Disclosure, for…Подробнее
Портфолио решений Cisco в области безопасности за 5 минут
Решения безопасности Cisco помогут вам обеспечить максимальную эффективность инвестиций, защититься от посягательств и оценить решениями в вашей сети. Подписаться на…Подробнее
Webinar: Why Executives Underinvest in Security
Watch this webinar to learn how to get around misguided thinking that leads to executive under investment in cyber security,…Подробнее
Disobey 2017 — Mårten Mickos — Hacking for fun and profit
HackerOne CEO Mårten Mickos on stage at Disobey 2017 talking about hacking for fun and profit. Why do hackers hack…Подробнее
451 Research Webinar: Bug Bounties and the Path to Secure Software
Scott Crawford, Research Director of Information Security at 451 Research, shares: Why having a Vulnerability Disclosure Policy is now “table…Подробнее
What impresses you the most about the HackerOne hacker community?
We continue to be amazed by the talent, diversity, and ability of the hackers in our community. We have a…Подробнее
Las Vegas h1-702 2017 | HackerOne’s Largest Live-Hacking Event Ever
Over 50-hackers from all around the world come to Las Vegas during DEF CON for 3-days of hacking. Set on…Подробнее
Why Should Companies Leverage Hacker-Powered Security?
Jobert Abma, Alex Bekker, and Justin Calmus answer the question: Why should companies work with hackers? Given enough eyes, all…Подробнее
HackerOne Product Walkthrough
Get a feel for the HackerOne product flow from both the security team’s perspective and researchers perspective. HackerOne’s Guy Ben-Simhon…Подробнее
Bug Bounty Product Demo with HackerOne Co-Founder Michiel Prins
Watch this video of our LIVE webinar recording on how you can leverage hacker-powered security to receive and resolve critical…Подробнее
An Invitation to Hack: The Benefits and Risks of Vulnerability Disclosure Programs
Megan Brown and Matt Gardner for Wiley Rein Privacy & Cybersecurity Practice team up with HackerOne’s CTO and Co-Founder Alex…Подробнее
Безопасный Интернет вещей
Сегментация сети, без труда. Структура коммутации Cisco позволяет задать сегментацию на доступном языке. Подробнее: http://cs.co/90068WpZ8 Подписаться на канал Cisco: http://bit.ly/L1TDRt
Learn about confidential, hacker powered security testing
https://www.hackerone.com/product/challenge You need to find security gaps in your web or mobile app before the bad guys. Continuous code deployments…Подробнее
Innovate faster without sacrificing security or quality — GitLab and HackerOne Webinar
In this webinar, GitLab’s Product Manager, Victor Wu, dives into how GitLab helps you ship secure code, the tools they…Подробнее
The Hacker Army Protecting Your Data — Marten Mickos at Collision 2017
HackerOne CEO Marten Mickos at Collision Conference 2017 The gig economy meets cybersecurity: the global hacker community is supporting the…Подробнее
Hacker-powered Software Development [webinar] with Assembla’s CTO Jacek Materna
Creating secure software at the speed of agile: Your SDLC is incomplete without Hacker-powered security with Assembla CTO, Jacek Materna.…Подробнее
Engineering, Hacking, and Security Panel at h1-415
On a sunny and brisk winter day this past February, 30 hackers gathered in a San Francisco high rise for…Подробнее
Tapping Hackers for Continuous Security — Michiel Prins at FinDEVr
Bug bounty programs are popping up all over the place, as more and more companies embrace collaborating with friendly hackers…Подробнее
Bug Bounty Field Manual — Cliff Notes from the Author Adam Bacchus
Download the guide now! https://www.hackerone.com/resources/bug-bounty-field-manual The Bug Bounty Field Manual is the most comprehensive, educational, practical, and valuable resource ever…Подробнее