ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:HackerOne

  • Attack Surface Visibility and Reducing Risk with HackerOne: Verizon Media Webinar

    Verizon Media is the media giant that owns a slew of dynamic brands including Yahoo, AOL, Tumblr, that over 1 billion people love and trust. Cybersecurity is paramount in maintaining that trust. In this webinar, learn how their security team worked with HackerOne to run a robust bug bounty program aimed at reducing the risk of a security incident.

  • Hacker-Powered Data - Security Weaknesses and Embracing Risk with HackerOne

    Today, companies, enterprises, & governments are embracing collaboration with hackers to find vulnerabilities before criminals have a chance to exploit them. In this webcast, Miju Han from HackerOne discusses the most common vulnerabilities not found on the OWASP top 10.

  • The Hacker Powered Security Report 2019

    Security vulnerabilities are a fact of life. For this reason, organizations are competing to attract hackers who have 1 key advantage over traditional methods: they can think like an attacker. In this 2019 research report, learn about the state of hacker-powered security.

  • Qualcomm's Alex Gantman on Bug Bounties

    Qualcomm's technologies are powering the world of connected devices. But since Qualcomm's technology isn't the end product, it's difficult to determine the root of a device's vulnerability. In this case study, see what the VP of Engineering at Qualcomm, had to say about the company's approach to bug bounties and hacker-powered security.

  • Sumo Logic Uses Hacker-Powered Pen Tests for Security and Compliance

    Sumo Logic started seeing their pen testing reports coming back clean. Although this sounds like good news, they knew it must be because their pen testers kept looking in the same places. In this case study, learn why they decided they needed a more diverse group of testers and how it led them to HackerOne and the hacker-powered security model.

  • The Zenefits Bug Bounty Story

    Zenefits, the All-in-One HR Platform, holds sensitive financial data for over 10,000 small and medium businesses. In order to protect this high risk data, Zenefits has partnered with HackerOne to implement a successful bug bounty program. In this case study, explore 4 tips for a successful private bounty program.

  • Salesforce Uses Bug Bounties to Protect Customer Data

    Salesforce's Bug Bounty program is one of their many efforts that contributes to the security of their products, and therefore, their customers. In this case study, learn how Salesforce has worked with HackerOne to successfully implement their bug bounty program. Also, explore the benefits Salesforce has seen.

  • Avoid the Breach With Effective Application Security Testing

    Security is a top priority for e-commerce giant Shopify. Join Shopify's Vice President of Security Engineering and IT, Andrew Dunbar in this webcast as he discusses best practices for testing and securing your cloud-based web applications. The session will also cover how you can scale application security for high-growth DevOps organizations.

  • Meet PCI DSS Requirements

    Many organizations are limited by traditional penetration tests. A better approach is needed to discover real-world vulnerabilities while meeting penetration testing requirements set forth by PCI-DSS. In this webcast, learn how crowdsourced security testing addresses compliance requirements, scales security teams and keeps applications safe.

  • The Total Economic Impactâ„¢ Of HackerOne Challenge

    HackerOne provides security and compliance penetration (pen) testing services that help its customers identify and remediate security vulnerabilities. To understand the benefits, costs, and risks associated with this investment, Forrester interviewed 4 customers with experience using HackerOne Challenge. Download the report for key findings.

  • The Beginners' Guide to Hacker-Powered Security

    Leveraging the wisdom and power of the vast white-hat hacker community is a new security expectation. In this white paper, learn the best practices for starting and running effective disclosure and bug bounty programs, and how to integrate hacker-powered security into your organization.

  • 7 Common Security Pitfalls to Avoid When Migrating to The Cloud

    The speed of cloud migration is outpacing the speed of security team expansion. How do you keep up? Read on to learn how to prevent such a security regression when migrating to the cloud.

  • The Hacker Report

    Many hackers are finding career building opportunities through bug bounties, with companies hiring from within the hacker community at a faster clip than ever before. As hacking grows in popularity, training continues to be a focus. Download this research report that details more than 300,000 individuals who represent the hacker community today.

  • The Pen Test Dilemma

    Today typical pen test methodologies are falling behind the increasingly innovative methods used by criminals. Why? In this white paper, learn about 3 common issues with traditional pen tests and how your organization could benefit from conducting hacker-powered pen tests instead.

  • Bug Bounty Field Manual

    Bug bounty programs can be very helpful in finding bugs within your system. They allow your engineering team to secure your systems faster and cheaper than ever before. In this e-book, learn everything you need to know to plan, launch and operate a successful bug bounty program.

  • What is a Vulnerability Disclosure Policy and Why Do You Need One?

    Download this article to find out what a vulnerability disclosure policy (VDP) is, what's included in a good policy, which organizations have a VDP today, and which government agencies have published guidance on VDPs.

  • Hacker-Powered Pen Tests and the Power of More

    Like traditional penetration testing, a hacker-powered pen test like the HackerOne Challenge program runs for a fixed time period. But it also brings to bear the skills of up to thousands of hackers who probe your web applications for vulnerabilities. In this white paper, learn about the advantages of HackerOne Challenge.

  • Next-Gen Application Security

    How do you get started with bug bounties and where do they fit in a DevOps workflow? Download this paper to find out.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.