All resources sponsored by:

HackerOne

16 Matches
The Hacker Powered Security Report 2019
sponsored by HackerOne
ANALYST REPORT:Security vulnerabilities are a fact of life. For this reason, organizations are competing to attract hackers who have 1 key advantage over traditional methods: they can think like an attacker. In this 2019 research report, learn about the state of hacker-powered security.
Posted: 16 Sep 2019 | Published: 16 Sep 2019
Get This Now


Qualcomm's Alex Gantman on Bug Bounties
sponsored by HackerOne
CASE STUDY:Qualcomm's technologies are powering the world of connected devices. But since Qualcomm's technology isn't the end product, it's difficult to determine the root of a device's vulnerability. In this case study, see what the VP of Engineering at Qualcomm, had to say about the company's approach to bug bounties and hacker-powered security.
Posted: 14 Jun 2019 | Published: 22 Jun 2017
Get This Now


Sumo Logic Uses Hacker-Powered Pen Tests for Security and Compliance
sponsored by HackerOne
CASE STUDY:Sumo Logic started seeing their pen testing reports coming back clean. Although this sounds like good news, they knew it must be because their pen testers kept looking in the same places. In this case study, learn why they decided they needed a more diverse group of testers and how it led them to HackerOne and the hacker-powered security model.
Posted: 14 Jun 2019 | Published: 14 Jun 2019
Get This Now


The Zenefits Bug Bounty Story
sponsored by HackerOne
CASE STUDY:Zenefits, the All-in-One HR Platform, holds sensitive financial data for over 10,000 small and medium businesses. In order to protect this high risk data, Zenefits has partnered with HackerOne to implement a successful bug bounty program. In this case study, explore 4 tips for a successful private bounty program.
Posted: 14 Jun 2019 | Published: 14 Jun 2019
Get This Now


Salesforce Uses Bug Bounties to Protect Customer Data
sponsored by HackerOne
CASE STUDY:Salesforce's Bug Bounty program is one of their many efforts that contributes to the security of their products, and therefore, their customers. In this case study, learn how Salesforce has worked with HackerOne to successfully implement their bug bounty program. Also, explore the benefits Salesforce has seen.
Posted: 14 Jun 2019 | Published: 14 Jun 2019
Get This Now


Avoid the Breach With Effective Application Security Testing
sponsored by HackerOne
WEBCAST:Security is a top priority for e-commerce giant Shopify. Join Shopify's Vice President of Security Engineering and IT, Andrew Dunbar in this webcast as he discusses best practices for testing and securing your cloud-based web applications. The session will also cover how you can scale application security for high-growth DevOps organizations.
Posted: 04 Jun 2019 | Premiered: Jun 4, 2019
Get This Now


Meet PCI DSS Requirements
sponsored by HackerOne
WEBCAST:Many organizations are limited by traditional penetration tests. A better approach is needed to discover real-world vulnerabilities while meeting penetration testing requirements set forth by PCI-DSS. In this webcast, learn how crowdsourced security testing addresses compliance requirements, scales security teams and keeps applications safe.
Posted: 04 Jun 2019 | Premiered: Jun 4, 2019
Get This Now


The Total Economic Impactâ„¢ Of HackerOne Challenge
sponsored by HackerOne
RESEARCH CONTENT:HackerOne provides security and compliance penetration (pen) testing services that help its customers identify and remediate security vulnerabilities. To understand the benefits, costs, and risks associated with this investment, Forrester interviewed 4 customers with experience using HackerOne Challenge. Download the report for key findings.
Posted: 10 May 2019 | Published: 31 May 2019
Get This Now


The Beginners' Guide to Hacker-Powered Security
sponsored by HackerOne
WHITE PAPER:Leveraging the wisdom and power of the vast white-hat hacker community is a new security expectation. In this white paper, learn the best practices for starting and running effective disclosure and bug bounty programs, and how to integrate hacker-powered security into your organization.
Posted: 11 Mar 2019 | Published: 11 Mar 2019
Get This Now


7 Common Security Pitfalls to Avoid When Migrating to The Cloud
sponsored by HackerOne
WHITE PAPER:The speed of cloud migration is outpacing the speed of security team expansion. How do you keep up? Read on to learn how to prevent such a security regression when migrating to the cloud.
Posted: 08 Mar 2019 | Published: 08 Mar 2019
Get This Now


The Hacker Report
sponsored by HackerOne
WHITE PAPER:Many hackers are finding career building opportunities through bug bounties, with companies hiring from within the hacker community at a faster clip than ever before. As hacking grows in popularity, training continues to be a focus. Download this research report that details more than 300,000 individuals who represent the hacker community today.
Posted: 08 Mar 2019 | Published: 08 Mar 2019
Get This Now


The Pen Test Dilemma
sponsored by HackerOne
WHITE PAPER:Today typical pen test methodologies are falling behind the increasingly innovative methods used by criminals. Why? In this white paper, learn about 3 common issues with traditional pen tests and how your organization could benefit from conducting hacker-powered pen tests instead.
Posted: 07 Mar 2019 | Published: 07 Mar 2019
Get This Now


Bug Bounty Field Manual
sponsored by HackerOne
EBOOK:Bug bounty programs can be very helpful in finding bugs within your system. They allow your engineering team to secure your systems faster and cheaper than ever before. In this e-book, learn everything you need to know to plan, launch and operate a successful bug bounty program.
Posted: 07 Mar 2019 | Published: 07 Mar 2019
Get This Now


What is a Vulnerability Disclosure Policy and Why Do You Need One?
sponsored by HackerOne
WHITE PAPER:Download this article to find out what a vulnerability disclosure policy (VDP) is, what's included in a good policy, which organizations have a VDP today, and which government agencies have published guidance on VDPs.
Posted: 06 Mar 2019 | Published: 06 Mar 2019
Get This Now


Hacker-Powered Pen Tests and the Power of More
sponsored by HackerOne
WHITE PAPER:Like traditional penetration testing, a hacker-powered pen test like the HackerOne Challenge program runs for a fixed time period. But it also brings to bear the skills of up to thousands of hackers who probe your web applications for vulnerabilities. In this white paper, learn about the advantages of HackerOne Challenge.
Posted: 06 Mar 2019 | Published: 06 Mar 2019
Get This Now


Next-Gen Application Security
sponsored by HackerOne
WHITE PAPER:How do you get started with bug bounties and where do they fit in a DevOps workflow? Download this paper to find out.
Posted: 05 Mar 2019 | Published: 05 Mar 2019
Get This Now


16 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement