HackerOne

Cloud Native All Stars Join Slim.AI Advisory Board to Drive Adoption of Container Best Practices for Every Developer

Retrieved on: 
Thursday, August 19, 2021

Merker has been involved in cloud native, DevOps, and enterprise software for over two decades.

Key Points: 
  • Merker has been involved in cloud native, DevOps, and enterprise software for over two decades.
  • Brendan O'Leary, senior developer evangelist for GitLab and member of the governing board of the Cloud Native Computing Foundation (CNCF).
  • The enthusiasm of these industry leaders in joining the advisory board underscores the critical need for what Slim.AI is building: a cloud-native developer platform that automates container best practices and streamlines container lifecycle management.
  • Putting the power of container best practices into the hands of every cloud native developer by removing complexity will drive adoption and market opportunity, and the guidance of this stellar group is central to making it happen."

Ministry of Defence Embraces Hackers to Secure Digital Assets

Retrieved on: 
Tuesday, August 3, 2021

The United Kingdoms Ministry of Defence (MoD) today announced the conclusion of its first bug bounty challenge with HackerOne.

Key Points: 
  • The United Kingdoms Ministry of Defence (MoD) today announced the conclusion of its first bug bounty challenge with HackerOne.
  • The Ministry of Defence program was a 30-day, hacker-powered security test aimed at surfacing vulnerabilities before they can be exploited by adversaries.
  • It is important for us to continue to push the boundaries with our digital and cyber development to attract personnel with skills, energy and commitment.
  • By disclosing vulnerabilities to security teams, ethical hackers will help the Ministry of Defence secure its digital assets and defend against cyberattacks.

HackerOne Deploys Tray Embedded to Deliver 4x Faster Customer Integrations

Retrieved on: 
Thursday, July 29, 2021

Tray.io , the leader in low-code general workflow automation, today announced that HackerOne , the worlds most trusted hacker-powered security platform, is using Tray Embedded to develop and deliver powerful customer integrations at scale.

Key Points: 
  • Tray.io , the leader in low-code general workflow automation, today announced that HackerOne , the worlds most trusted hacker-powered security platform, is using Tray Embedded to develop and deliver powerful customer integrations at scale.
  • With Tray Embedded, HackerOne quadrupled its integration delivery speed to maximize developer efficiency and reduce integration maintenance burden.
  • To maximize efficiency, reduce the maintenance burden, and deliver high-quality integrations at scale, the HackerOne team looked to Tray.io to help build and maintain customer integrations.
  • Tray Embedded Enables the Rapid Deployment of High-quality, White-labeled Integrations
    Since implementing Tray Embedded, HackerOne quadrupled its integration delivery speed developing and deploying new customer integrations in two to three weeks, compared to two to three months prior to engaging with Tray.io.

HackerOne Announces GitHub Integration to Simplify Developer Security Tasks

Retrieved on: 
Thursday, June 17, 2021

Today, HackerOne , the worlds most trusted hacker-powered security platform, announced a new workflow automation integration with GitHub that enables the tracking and synchronization of high-priority vulnerability reports between HackerOne and GitHub.

Key Points: 
  • Today, HackerOne , the worlds most trusted hacker-powered security platform, announced a new workflow automation integration with GitHub that enables the tracking and synchronization of high-priority vulnerability reports between HackerOne and GitHub.
  • With just one click, GitHub issues can be created from HackerOne intelligence, enabling teams to rapidly take action and track progress.
  • With this integration, security teams can quickly deliver potential vulnerabilities to developers within their workflows, helping them to shift left and rapidly respond to and mitigate vulnerabilities.
  • As the worlds most trusted hacker-powered security platform, HackerOne gives organizations access to the largest community of hackers on the planet.

HackerOne Welcomes Product and Engineering Leaders to Scale the World’s Most Trusted Hacker-Powered Security Platform

Retrieved on: 
Thursday, May 20, 2021

b'HackerOne , the world\xe2\x80\x99s most trusted hacker-powered security platform, today announced that it is doubling down on its investment in innovation with the hiring of new leaders to drive the product roadmap.

Key Points: 
  • b'HackerOne , the world\xe2\x80\x99s most trusted hacker-powered security platform, today announced that it is doubling down on its investment in innovation with the hiring of new leaders to drive the product roadmap.
  • \xe2\x80\x9cBut we are just scratching the surface in terms of applications for hacker-powered security and our ability to solve customers\xe2\x80\x99 security challenges.
  • As the world\xe2\x80\x99s most trusted hacker-powered security platform, HackerOne gives organizations access to the biggest and most diverse community of hackers on the planet.
  • HackerOne was ranked fifth on the Fast Company World\xe2\x80\x99s Most Innovative Companies list for 2020.\nView source version on businesswire.com: https://www.businesswire.com/news/home/20210520005193/en/\n'

HackerOne and SecurityScorecard Partner to Combine Bug Bounty Information and Security Ratings for True View of Cyber Posture

Retrieved on: 
Tuesday, May 11, 2021

This complements SecurityScorecard\'s outside-in approach to evaluating an organization\xe2\x80\x99s security posture.

Key Points: 
  • This complements SecurityScorecard\'s outside-in approach to evaluating an organization\xe2\x80\x99s security posture.
  • \xe2\x80\x9cWe are excited to partner with HackerOne and are confident organizations and insurers will be enabled to better pinpoint risks with this comprehensive data.
  • This best practice is now a crucial step toward a proactive security posture that confidently supports today\'s rapidly evolving business needs.
  • As the world\xe2\x80\x99s most trusted hacker-powered security platform, HackerOne gives organizations access to the largest community of hackers on the planet.

HackerOne’s Continuous Security Testing Platform Helps Detect, Remediate, and Analyze Cloud Misconfigurations for Global Organizations

Retrieved on: 
Thursday, April 22, 2021

b"Today, HackerOne , the world\xe2\x80\x99s most trusted hacker-powered security platform, is enhancing its product capabilities to help global organizations easily scale their security and mitigate security risks where traditional security tools fall short.

Key Points: 
  • b"Today, HackerOne , the world\xe2\x80\x99s most trusted hacker-powered security platform, is enhancing its product capabilities to help global organizations easily scale their security and mitigate security risks where traditional security tools fall short.
  • Zebra has scaled our security program across the different product offerings within HackerOne from security assessments for product releases, bug bounty for continuous testing, and a mechanism for third-party security researchers to submit vulnerabilities.
  • Yet, 99 percent of cloud security failures will be the buyer\xe2\x80\x99s fault, meaning cloud administrators are now expected to know how cloud security services work, configure them correctly, and maintain their cloud deployments.\n\xe2\x80\x9cWith adoption comes risk,\xe2\x80\x9d Rice continues.
  • As the world\xe2\x80\x99s most trusted hacker-powered security platform, HackerOne gives organizations access to the largest community of hackers on the planet.

Nord Security extends its bounty program to NordPass and NordLocker

Retrieved on: 
Thursday, April 1, 2021

LONDON, April 01, 2021 (GLOBE NEWSWIRE) -- Nord Security has officially launched its bug bounty program for all three of its products: NordVPN , NordPass , and NordLocker .

Key Points: 
  • LONDON, April 01, 2021 (GLOBE NEWSWIRE) -- Nord Security has officially launched its bug bounty program for all three of its products: NordVPN , NordPass , and NordLocker .
  • However, as the product family is expanding, the program is now extended to NordPass, a next-generation password manager, and NordLocker, an encryption-powered data security solution.
  • The Bug Bounty program is implemented via the HackerOne platform , which connects businesses with penetration testers and security researchers.
  • Nord Security is a home for advanced security solutions that share the Nord brand and values.

HackerOne Reveals Industry and Company Growth as Enterprises Secure Rapid Digital Transformations

Retrieved on: 
Monday, March 8, 2021

Also today, HackerOne announced that Phil Venables, Chief Information Security Officer for Google Cloud, has joined its Board of Directors.

Key Points: 
  • Also today, HackerOne announced that Phil Venables, Chief Information Security Officer for Google Cloud, has joined its Board of Directors.
  • To adapt to business risks and resource restrictions amidst the COVID-19 pandemic, 36% of CISOs accelerated their digital transformation initiatives , bringing security transformations in tow.
  • In June, HackerOne extended its Pentest offering to European organizations, which contributed to the continents substantial year over year growth.
  • HackerOne was ranked fifth on the Fast Company Worlds Most Innovative Companies list for 2020.

Defense Digital Service Kicks Off Third ‘Hack the Army’ Bug Bounty Challenge with HackerOne

Retrieved on: 
Wednesday, January 6, 2021

The Defense Digital Service (DDS) and HackerOne today announced the launch of DDSs eleventh bug bounty program with HackerOne and the third with the U.S. Department of the Army.

Key Points: 
  • The Defense Digital Service (DDS) and HackerOne today announced the launch of DDSs eleventh bug bounty program with HackerOne and the third with the U.S. Department of the Army.
  • Hack the Army 3.0 builds upon the successes and lessons of our prior bug bounty programs."
  • Participation in the Hack the Army 3.0 bug bounty challenge is open by invitation-only to civilian hackers and active U.S. military members.
  • Previous bug bounty challenges and results include: Hack the Pentagon , Hack the Army , Hack the Air Force , Hack the Air Force 2.0 , Hack the Defense Travel System , Hack the Army 2.0 , Hack the Air Force 3.0 , Hack the Air Force 4.0 , Hack the Proxy and Hack the Marine Corps .