Read More
125 results found
Featured
Securing the Future of AI
Featured
The 15% Advantage: How High-Performing CISOs Leverage Crowdsourced Security
Featured
8th Annual Hacker-Powered Security Report 2024/2025
Featured
When ROI Falls Short: A Guide to Measuring the Value of Cybersecurity Investments with Return on Mitigation
Featured
Snap Inc: Pioneering AI Red Teaming
Featured
Adobe and HackerOne’s Decade-Long Partnership with the Ethical Hacking Community
Featured
Deploy GenAI with Confidence
Featured
HackerOne Platform Solution Brief
Featured
Hai Solution Brief
Featured
Bug Bounty Solution Brief
Featured
AI Red Teaming Solution Brief
Featured
How Anthropic’s Jailbreak Challenge Put AI Safety Defenses to the Test
Featured
How HackerOne Helps Snap Ensure User Trust in AWS Cloud
Featured
How TikTok uses Cyberstrength to Stay a Step Ahead with HackerOne
Featured
Challenge Solution Brief
Featured
Pentest Solution Brief
Featured
Response Solution Brief
Featured
Code Solution Brief
Featured
Spot Checks Solution Brief
Featured
Triage Solution Brief
Featured
HackerOne Security Advisory Services Solution Brief
Featured
Integrations & Automations Solution Brief
Featured
Clear Solution Brief
Featured
Gateway Solution Brief
Featured
HackerOne's Pentest Community Solution Brief
Featured
HackerOne Live Hacking Events
Featured
loveholidays Secures Online Travel Platform with HackerOne Pentest and Bug Bounty
Featured
The Power of HackerOne’s API Automation: A Q+A With Veterans United
Featured
How Delivery Hero Scales a Global Security Strategy with HackerOne
Featured
Mercado Libre’s Journey to a Public Bug BountyProgram
Featured
How Ethical Hackers Help AS Watson Address Digital Risk
Featured
SANS White Paper: Human-Powered Security Testing
Featured
Human-Powered Security with HackerOne
Featured
AI with HackerOne: Insights from the 2024 SANS Institute Survey
Featured
How Security Leaders Build AI-Augmented Defense in Depth
Featured
Beyond ROI: Unlocking the Financial Value of Cybersecurity with Return on Mitigation (RoM)
Featured
AI Safety and Security Checklist
Featured
Bug Bounty Readiness Self-Assessment
Featured
Pre-Pentest Checklist: Essential Questions to Answer Before Your Next Pentest
Featured
VDP Checklist: Critical Components and Best Practices for a Successful VDP
Featured
ESG AI-Augmented Offensive Security Whitepaper
Featured
Gartner® Market Guide for AI Trust, Risk, and Security Management
Featured
Operationalizing Gartner TRiSM: Testing AI for Trust, Risk, and Security
Featured
Vulnerability Disclosure Programs (VDPs): A Comprehensive Guide
Featured
Beyond Traditional Pentesting
Featured
The Executive Guide to Human Security Testing
Featured
The Ultimate Guide to Managing Ethical and Security Risks in AI
Featured
SANS 2024 AI Survey
Featured
The State of Vulnerability Disclosure Usage in Global Consumer IoT in 2024
Featured
Navigating the Security Budget Crunch: How Security Leaders Balance Risk and Resilience
Featured
The Pentesting Matrix
Featured
How Continuous Attack Resistance Helps Improve Security Maturity
Featured
Multinational Financial Institution Achieves Real-Time Code Security
Featured
How Sage Strengthens Business Resilience with HackerOne Security Advisory Services
Featured
Zebra Defends its Attack Surface From All Angles With HackerOne
Featured
Grammarly's Security Approach
Featured
Starling Bank Customer Story
Featured
How Rightsline guards the entertainment industry's intellectual property
Featured
How Wind River Tightens Its Security Posture With Hackerone Pentest
Featured
Gitlab's Approach To Security
Featured
PayPal On Creating Strong Relationships With Security Researchers
Featured
Program Insights from the PayPal Security Team
Featured
Zomato's Hacker-Focused Security Approach
Featured
Shopify's Customer Story
Featured
Bug Bounty Q&A with Qualcomm
Featured
U.S. Department of Defense's Customer Story
Featured
How General Motors Partners with Hackers
Featured
Distributed Defense: How Governments Deploy Hacker-Powered Security
Featured
Coinbase's Crowdsourced Security Story
Featured
The GitHub Bug Bounty Story
Featured
Turning Risk Reduction into a Living Metric: The RoM Dashboard is Here
Featured
Beyond the Noise: How HackerOne Cuts Through the Noise in the Age of AI
Featured
Scale Security Knowledge with Shared Hai Plays
Featured
How We Escalate Critical Reports Faster Using Hai + Automations
Featured
3 Crowdsourced Security Myths Are Holding You Back
Featured
8 AI Cybersecurity Concepts Every CISO Must Know: Insights from Anthropic and AWS
Featured
Rethinking Risk in the Age of AI
Featured
The Leading CISO Strategy to Pentest as a Service
Featured
Calculating Cybersecurity ROI with Return on Mitigation (RoM)
Featured
45% Struggle with Security: How Defense in Depth Can Help
Featured
We’re Running Hai Insight Agent on Our Own Bug Bounty Program – See it in Action
Featured
Hai Insight Agent: The Teammate Who Remembers Every Report
Featured
External Connectors: Extend HackerOne Automations to Any Tool
Featured
Resurrecting Shift-Left With Human-in-the-loop AI
Featured
The Cost Savings of Fixing Security Flaws in Development
Featured
How AI Can Navigate Code and Catch Complex Vulnerabilities
Featured
How HackerOne Reinvented Security for Developers
Featured
Introducing HackerOne Automations
Featured
Introducing the PartnerOne Technology Alliance Program
Featured
SCW + HackerOne: Leveling up developer security skills with HackerOne vulnerability data
Featured
Enhancing Application Security with GitLab + HackerOne
Featured
Automate and Accelerate Vulnerability Management with HackerOne & ServiceNow
Featured
The Beginners’ Guide to Bug Bounty Programs
Featured
The All-New Security Leader's Handbook
Featured
Is Your AI Deployment Risky? How to Address AI Safety, Security, and Reliability Risks
Featured
Why Implement a Vulnerability Disclosure Program (And How to Do It)
Featured
Retail Under Attack: HackerOne Customer Insights on Outsmarting Cybercriminals
Featured
Broken Security Promises: How Human-AI Collaboration Rebuilds Developer Trust
Featured
Next-Gen Solutions: Application Security Launch Effective Agile Security for Agile Development
Featured
7th Annual Hacker-Powered Security Report
Featured
Epic Games Live Hacking Event Recap: Las Vegas
Featured
Amazon & AWS Live Hacking Event Recap: Edinburgh
Featured
TikTok Live Hacking Event Recap: Las Vegas
Featured
Capital One Live Hacking Event: Miami
Featured
PayPal Live Hacking Event: Tokyo
Featured
Salesforce Live Hacking Event: Singapore
Featured
Truth Behind the Hack: Experts Break Down AI Red Teaming in a Live Q&A
Featured
Beyond the Algorithm: AI Developers' AMA
Featured
Continuous Security with HackerOne Bug Bounty: Cyber Defense Done Right
Featured
Why Traditional Pentesting Is Letting You Down (and How to Fix It)
Featured
The Role of Pentest as a Service (PTaaS): From Compliance to Enhancing Application Security
Featured
Truth Behind the Hack: Elite Pentesters Tell All in a Live Q&A
Featured
Beyond Traditional Testing: Elevate Security with Pentests That Deliver Results
Featured
The Latest Insights on Global VDP Adoption and IoT Security Trends
Featured
From Report to Results: Building Resilience with Insights from the Hacker-Powered Security Report
Featured
5 Things You Need to Learn From the New Hacker-Powered Security Report
Featured
Staying Ahead of Cybercriminals
Featured
SIX Group’s Security Strategy and the Crucial Role that Hackers Play
Featured
CISO Virtual Roundtable: Recession-Proof Your Security Program
Featured
Strengthen Your Security Posture with a Continuous Cycle of Vulnerability Intelligence— with Hyatt Hotels and DoD’s Defense Cyber Crime
Featured
HackerOne Customer Fireside Chat with Superbet
Featured
Adobe Security Recap: 2024 Ambassador World Cup Final Four
Featured
HackerOne and MoD Fireside Chat
Featured
Security@2023 Hacker Panel: What Hackers Can Tell You About AI Security
Featured
Superbet Highlights
Featured
Content types
None
E-book
(11)
Research Report
(7)
Customer Story
(34)
On-demand Webinar
(26)
Solution Brief
(17)
White Paper
(2)
Checklist
(4)
Blog Post
(24)
Solutions
None
AI Red Teaming
(9)
Platform
(12)
Bug Bounty
(29)
Challenge
(7)
Pentest as a Service
(17)
Triage
(9)
Live Hacking Events
(10)
Hai
(7)
Response
(13)
Code
(6)
Advisory Services
(4)
Integrations
(8)
Topics
None
AI
(26)
Crowdsourced Security
(35)
Code Security
(10)
Offensive Security
(40)
Security Research
(9)
Defense in Depth
(8)
Return on Mitigation
(7)
Security Compliance
(5)
Vulnerability Management
(11)
Industries
None
Technology
(22)
Travel & Hospitality
(1)
Financial Services
(4)
Retail & E-Commerce
(6)
Government & Public Sector
(3)
Automotive & Transportation
(1)
Crypto & Blockchain
(1)
Media & Entertainment
(2)
Telecommunications
(1)
Thumbnails
Document Outline
Attachments
Layers
Current Outline Item
Previous
Next
Highlight All
Match Case
Match Diacritics
Whole Words
Color
Size
Color
Thickness
Opacity
Presentation Mode
Open
Print
Download
Current View
Go to First Page
Go to Last Page
Rotate Clockwise
Rotate Counterclockwise
Text Selection Tool
Hand Tool
Page Scrolling
Vertical Scrolling
Horizontal Scrolling
Wrapped Scrolling
No Spreads
Odd Spreads
Even Spreads
Document Properties…
Toggle Sidebar
Find
Previous
Next
Presentation Mode
Open
Print
Print
Download
Download
Current View
FreeText Annotation
Ink Annotation
Tools
Zoom Out
Zoom In
Automatic Zoom
Actual Size
Page Fit
Page Width
50%
75%
100%
125%
150%
200%
300%
400%
More Information
Less Information
Close
Enter the password to open this PDF file:
Cancel
OK
File name:
-
File size:
-
Title:
-
Author:
-
Subject:
-
Keywords:
-
Creation Date:
-
Modification Date:
-
Creator:
-
PDF Producer:
-
PDF Version:
-
Page Count:
-
Page Size:
-
Fast Web View:
-
Close
Preparing document for printing…
0%
Cancel