All resources sponsored by:

HackerOne

8 Matches
The Beginners' Guide to Hacker-Powered Security
sponsored by HackerOne
WHITE PAPER:Leveraging the wisdom and power of the vast white-hat hacker community is a new security expectation. In this white paper, learn the best practices for starting and running effective disclosure and bug bounty programs, and how to integrate hacker-powered security into your organization.
Posted: 11 Mar 2019 | Published: 11 Mar 2019
Get This Now


7 Common Security Pitfalls to Avoid When Migrating to The Cloud
sponsored by HackerOne
WHITE PAPER:The speed of cloud migration is outpacing the speed of security team expansion. How do you keep up? Read on to learn how to prevent such a security regression when migrating to the cloud.
Posted: 08 Mar 2019 | Published: 08 Mar 2019
Get This Now


The Hacker Report
sponsored by HackerOne
WHITE PAPER:Many hackers are finding career building opportunities through bug bounties, with companies hiring from within the hacker community at a faster clip than ever before. As hacking grows in popularity, training continues to be a focus. Download this research report that details more than 300,000 individuals who represent the hacker community today.
Posted: 08 Mar 2019 | Published: 08 Mar 2019
Get This Now


The Pen Test Dilemma
sponsored by HackerOne
WHITE PAPER:Today typical pen test methodologies are falling behind the increasingly innovative methods used by criminals. Why? In this white paper, learn about 3 common issues with traditional pen tests and how your organization could benefit from conducting hacker-powered pen tests instead.
Posted: 07 Mar 2019 | Published: 07 Mar 2019
Get This Now


Bug Bounty Field Manual
sponsored by HackerOne
EBOOK:Bug bounty programs can be very helpful in finding bugs within your system. They allow your engineering team to secure your systems faster and cheaper than ever before. In this e-book, learn everything you need to know to plan, launch and operate a successful bug bounty program.
Posted: 07 Mar 2019 | Published: 07 Mar 2019
Get This Now


What is a Vulnerability Disclosure Policy and Why Do You Need One?
sponsored by HackerOne
WHITE PAPER:Download this article to find out what a vulnerability disclosure policy (VDP) is, what's included in a good policy, which organizations have a VDP today, and which government agencies have published guidance on VDPs.
Posted: 06 Mar 2019 | Published: 06 Mar 2019
Get This Now


Hacker-Powered Pen Tests and the Power of More
sponsored by HackerOne
WHITE PAPER:Like traditional penetration testing, a hacker-powered pen test like the HackerOne Challenge program runs for a fixed time period. But it also brings to bear the skills of up to thousands of hackers who probe your web applications for vulnerabilities. In this white paper, learn about the advantages of HackerOne Challenge.
Posted: 06 Mar 2019 | Published: 06 Mar 2019
Get This Now


Next-Gen Application Security
sponsored by HackerOne
WHITE PAPER:How do you get started with bug bounties and where do they fit in a DevOps workflow? Download this paper to find out.
Posted: 05 Mar 2019 | Published: 05 Mar 2019
Get This Now


8 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement