How To
-
Mercado Libre Announces Public Bug Bounty [7 Bug Bounty Tips]
Author: Alejandro Federico Iacobelli, Application Security Director, Mercado Libre Since the emergence of XP in the mid-’90s, agile development methodologies…
Read More » -
Implementing Zero Trust Security With a VDP
I understand the importance of Zero Trust but, personally, I’ve had a hard time bridging the gap between how the…
Read More » -
Celebrating the Inaugural Glass Firewall Conference
This event’s focus was getting more women to participate in bug bounty programs, as we noticed the community is relatively…
Read More » -
GUEST BLOG: Governments Across The World Are Mandating Vulnerability Disclosure So Why Are Companies Sitting On Their Hands?
The IoT Security Foundation’s fifth annual report into the state of vulnerability disclosure consumer Internet of Things, produced by Copper…
Read More » -
AI Red Teaming: HackerOne’s Playbook
To ensure that AI is more secure and trustworthy, the EO calls on companies who develop AI and other companies…
Read More » -
Meet the Talent Strategy Team
Our understanding of leadership and employee needs and the ability to build learning and development content made it easier for…
Read More » -
How to Fortify Your Assets & Maintain Compliance
Stepped-up SEC Enforcement Makes Proactive Security a Must The SEC’s finalized cybersecurity rules, effective starting mid-December 2023, place a spotlight…
Read More » -
Severity Does Not Mean Priority
Automated scanners and tools are noisy; they do not know your business and can’t extrapolate context to truly understand validity…
Read More » -
Bug Bounty Vs. Pentest [Differences Explained]unty vs. Penetration Testing: What’s the Difference?
What Is Pentesting? Pentesting attempts to ethically breach a system’s security for the purpose of vulnerability identification. In most cases,…
Read More » -
2024 Cybersecurity Budget Planning: Budgeting for VDPs
New and Upcoming Public Policy on VDPs VDPs are in the midst of a shift from an industry best practice…
Read More »