Skip to main content

HackerOne Blog

Read the HackerOne blog to learn strategies for strengthening your attack resistance with help from highly skilled ethical hackers. Improve your security profile and stay up to date on industry trends and emerging threats.

Vulnerability Management

Level Up Your Bug Bounty Effectiveness, Part II: Operational Areas to Continuously Improve

Hacker Engagement

First impressions matter! Win hackers over early on and create “anchor” hackers - program stalwarts that learn all about the...

Ethical Hacker, Vulnerability Management

How Hackers Can Strengthen Cloud Security for Applications

In this session at our 5th annual global cybersecurity conference, HackerOne’s Tim Matthews sat down with Josh...

Vulnerability Management

What Is a Bug Bounty? Should You Offer One? And How To Do It

What Is a Bug Bounty? A bug bounty is a reward offered by organizations to ethical hackers for discovering...
Vulnerability Management

Bug Bounty vs. VDP | Which Program Is Right for You?

We explain bug bounty programs and Vulnerability Disclosure Programs (VDPs), their pros and cons, and how each...

Vulnerability Management, Security At Event

How to Use Bug Bounty Program Data to Improve Security and Development

Bug bounty program data tells a story—but which story? Tracking program metrics can help organizations...

Customer Stories, Vulnerability Disclosure, Response

DOD's DIB-VDP Pilot Hits Six Month Milestone

Six months into the 12-month pilot with the Department of Defense’s Defense Industrial Base Vulnerability...

Vulnerability Disclosure

Vulnerability Disclosure | What’s the Responsible Solution?

Curious about vulnerability disclosure? We explain what it is, why there may be friction between the...

Best Practices, Customer Stories, Bounty, Penetration Testing

Jedox’s Journey with HackerOne: A Q&A with CTO, Vladislav Maličević

Jedox secures their cloud - and their customers - with HackerOne Assessments and HackerOne Bounty. Read this...

Security At Event, Vulnerability Management, Vulnerability Disclosure

DevSecOps: Bridging the Gap Between Security and Development

Organizations that rely on developing secure, functional products understand the value of increased...