In this blog, we are excited to announce our white paper on Return on Mitigation (RoM), a framework we designed to quantify the financial impact of security programs in a way that speaks to business leaders.
Visualização de leitura
Celebrating 10 Years of Partnership: Snap and HackerOne Reach $1M in Bounties
At Snap, security is more than a priority—it’s a core mission. Over the past decade, Snap has partnered with HackerOne to build and sustain a robust bug bounty program. This collaboration has led to major milestones, including paying security researchers over $1M in bounties. To celebrate this achievement and their 10-year partnership, we spoke with Jim Higgins, Snap's Chief Information Security Officer, Vinay Prabhushankar, Snap’s Security Engineering Manager, and Ilana Arbisser, Snap’s Privacy Engineer.
Gain Actionable, Data-backed Insights with HackerOne Recommendations
What if your security program could self-optimize: analyze trends, identify weak points, and proactively propose actionable steps to strengthen defenses? With HackerOne Recommendations, it can.
Welcome, Hackbots: How AI Is Shaping the Future of Vulnerability Discovery
What are Hackbots and how are they impacting vulnerability discovery and the researcher community?
DORA Compliance Is Here: What Financial Entities Should Know
The new DORA regulation: everything your organization needs to know about its impact and how to comply.
What Will a New Administration and Congress Mean for Cybersecurity and AI Regulation?
The HackerOne Policy team analyzes cybersecurity and AI regulation in the U.S. under the incoming administration.
How HackerOne Reinvented Security for Developers
Applying human-in-the-loop principles creates application security controls loved by developers. See how.
Hope in the Fight Against Cyber Threats: A New Year’s Message to CISOs
HackerOne CEO Kara Sprague explores how the modern CISO can face mounting pressures in cybersecurity.
Resurrecting Shift-Left With Human-in-the-loop AI
Let's explore how human-in-the-loop AI can help implement successful secure-by-design.
Introducing Lightspark's Public Bug Bounty Program
Lightspark is excited to announce the launch of its public bug bounty program with HackerOne.
A Partial Victory for AI Researchers
What is the Digital Millennium Copyright Act and what are the implications of its recent ruling for AI researchers?
ROI Isn’t Cutting It: 6 Questions to Help CISOs Better Quantify Security Investments
Why ROI is not the most effective method to quantify cybersecurity investments — and how ROM can help.
The OWASP Top 10 for LLMs 2025: How GenAI Risks Are Evolving
The new OWASP Top 10 for LLMs is here. How has it changed, and how can organizations prevent GenAI risks?
Breaking Down the OWASP Top 10: Insecure Design
Learn about the different types of insecure design vulnerabilities and how to identify them.
New York Releases AI Cybersecurity Guidance: What You Need to Know
What does New York's new AI Cybersecurity Guidance mean for financial institutions and other regulated companies?
Azure Cloud Configuration Review
Learn the testing methodologies and security best practices for Azure Cloud Configuration Review.
How Crypto and Blockchain Organizations Manage Complex Attack Surfaces With Competitive Security Testing Programs
What makes securing crypto and blockchain organizations so different than other industries? Let's look at the data.