Outsmart Cybercriminals with Proactive Attack Surface Management (ASM)
HackerOne » Application Security
by
1y ago
Why is ASM Important? Your attack surface is the sum of all entry points an attacker could use to access your ..read more
Visit website
100 Conversations with Start-up Security Leaders
HackerOne » Application Security
by
1y ago
Why are run-of-the-mill, traditional pentests not delivering effective results? Time and time again, I speak ..read more
Visit website
How Optimistic Can Security Professionals Afford to Be in 2023?
HackerOne » Application Security
by
1y ago
Cyber attackers are increasingly well-resourced and elusive. Yet, CyberEdge's 2023 Cyberthreat Defense Report found IT and security professionals are ..read more
Visit website
Robinhood Goes Long on Bug Bounty: Q&A with Ian Carroll and @ashwarya
HackerOne » Application Security
by
1y ago
Seven years of bug bounty, 21-hour average time to bounty, 130 hackers thanked, and hackers on both sides of the program: Robinhood’s Ian Carroll ..read more
Visit website
How Human Testers Improve Application Security
HackerOne » Application Security
by
1y ago
A suite of DevSecOps tools is available to automate reviews, audits, tests, and scans throughout the development pipeline, which have become standard ..read more
Visit website
Security Highlights: New CWE Rankings, Software Supply Chains, and Side-Channel Attacks
HackerOne » Application Security
by
1y ago
MITRE Releases 2022 CWE Top 25 The popular CWE Top 25 list, which ranks the most dangerous software vulnerabilities, has been updated for 2022. The ..read more
Visit website
Why HackerOne Acquired Pull Request and What It Means to Our Customers
HackerOne » Application Security
by
2y ago
Security vulnerabilities are a significant workflow disruption when discovered near the end of development. Vulnerabilities found after release are a ..read more
Visit website
5 Learnings From A Conversation With OP Financial Group's CISO And @mrtuxracer
HackerOne » Application Security
by
2y ago
On 20 January, HackerOne’s CEO, Marten Mickos, sat down for a chat with European hacker, Julien Ahrens a.k.a ..read more
Visit website
Spotlight on the Server-Side
HackerOne » Application Security
by
2y ago
Server-side request forgery (or SSRF) vulnerabilities are particularly dangerous because they can lead to ..read more
Visit website
How the Industry’s First Hacker-Powered API Helps Hackers Automate Workflows
HackerOne » Application Security
by
2y ago
One of the primary missions of the Defense Counterintelligence and Security Agency (DCSA) is to provide ..read more
Visit website

Follow HackerOne » Application Security on FeedSpot

Continue with Google
Continue with Apple
OR