Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Hackerone
Hackerone
How Bug Bounties Help You Shift Left – Source:www.hackerone.com
Source: www.hackerone.com - Author: johnk. For many organizations, the days when security acted as a final...
Hackerone
Hacking for Good – Source:www.hackerone.com
Source: www.hackerone.com - Author: Marten Mickos. We start the new year of 2020 with great prospects....
Hackerone
#AndroidHackingMonth: Introduction to Android Hacking by @0xteknogeek – Source:www.hackerone.com
Source: www.hackerone.com - Author: Joel Margolis. When I first started mobile hacking, it felt a lot...
Hackerone
How does Pentesting fit into your overall security strategy? – Source:www.hackerone.com
Source: www.hackerone.com - Author: HackerOne. Digital transformation has proven that every business is now a software...
Hackerone
Visma’s Ioana Piroska on Securing the Development Lifecycle Through Bug Bounties – Source:www.hackerone.com
Source: www.hackerone.com - Author: HackerOne. Visma is a leading business solution provider in Northern Europe, focusing...
Hackerone
VDPs are at the Heart of the Australian Cyber Security Centre’s Recommendations – Source:www.hackerone.com
Source: www.hackerone.com - Author: HackerOne. 2020 has been an important year for VDP standardization worldwide. Earlier...
Hackerone
One Month of Learnings from Flo Health’s Bug Bounty Program: A Q&A with CISO, Leo Cunningham – Source:www.hackerone.com
Source: www.hackerone.com - Author: elizabeth@hackerone.com. The CISO of Flo Health, the world’s most popular women’s health...
Hackerone
Time to Issue Your Own Cyber Executive Order – Source:www.hackerone.com
Source: www.hackerone.com - Author: Marten Mickos. Time is not kind to the security of an organization....
Hackerone
PayPal’s Third LHE Brings Top Global Hackers to the Virtual Stage – Source:www.hackerone.com
Source: www.hackerone.com - Author: jesse@hackerone.com. Hello hackers and welcome back! HackerOne and PayPal have geared up...
Hackerone
H1-702 Las Vegas Day 0: Setup – Source:www.hackerone.com
Source: www.hackerone.com - Author: jesse@hackerone.com. Let’s take a glimpse of what we see before our hackers...
Hackerone
XOXO: We Love Coinbase for Loving Bug Bounties – Source:www.hackerone.com
Source: www.hackerone.com - Author: johnk. Besides being the world’s most popular way to buy and sell...
Hackerone
HackerOne CEO joins Node.js Foundation Board – Source:www.hackerone.com
Source: www.hackerone.com - Author: johnk. Open source models are the backbone of the modern internet. Therefore,...
Hackerone
The Voices of Vulnerability Disclosure: Look Who’s Talking About VDPs – Source:www.hackerone.com
Source: www.hackerone.com - Author: luke. The attention being given to vulnerability disclosure policies (VDP) in the...
Hackerone
KPMG’s Cyber Security Expert Offers Advice for Bug Bounty Success – Source:www.hackerone.com
Source: www.hackerone.com - Author: luke. Before you propose a bug bounty program to your organization, you...
Hackerone
The European Commission’s First-Ever Bug Bounty Program – Source:www.hackerone.com
Source: www.hackerone.com - Author: johnk. The European Commission has selected HackerOne as the platform for their...
Hackerone
Hacking the U.S. Air Force (again) from a New York City subway station – Source:www.hackerone.com
Source: www.hackerone.com - Author: johnk. New York City during the holidays. Magical. Bringing together hackers from...
Hackerone
Bringing Private-sector Security into the U.S. Government [Security@ Recaps] – Source:www.hackerone.com
Source: www.hackerone.com - Author: johnk. “Hacking the U.S. Government” was the first panel discussion at Security@...
Hackerone
An Attorney’s View of Vulnerability Disclosure – Source:www.hackerone.com
Source: www.hackerone.com - Author: luke. Vulnerability Disclosure Programs (VDPs) are not only being promoted by more...
Hackerone
Breaking the Bank: Getting Financial Services Companies to Embrace Hacker-Powered Security – Source:www.hackerone.com
Source: www.hackerone.com - Author: luke. If any industry should readily grasp the concepts of economics and...
Hackerone
U.S. Senate Hearing – Data Security and Bug Bounty Programs: Lessons Learned – Source:www.hackerone.com
Source: www.hackerone.com - Author: Alex Rice. Today, HackerOne was invited to testify in front of the...
Hackerone
Calling All “Bureaucracy Hackers” – Source:www.hackerone.com
Source: www.hackerone.com - Author: luke. Lisa Wiswell, a HackerOne advisor and a principal at GRIMM cybersecurity...
Hackerone
Mr. Chairman, we need hackers! – Source:www.hackerone.com
Source: www.hackerone.com - Author: Marten Mickos. The more the world gets hacked, the more we need...
Hackerone
The CISO’s Guide to GDPR: Q&A with Thomas Fischer – Source:www.hackerone.com
Source: www.hackerone.com - Author: johnk. “I am by trade now a CISO. So I have to...
Hackerone
H1-415 Recap: Oath Pays Over $400,000 to Hackers in One Day – Source:www.hackerone.com
Source: www.hackerone.com - Author: johnk. It was 70 degrees, sunny and a Saturday, but everyone was...
Hackerone
Hacker-Powered pen tests at the U.S. Federal Government – Source:www.hackerone.com
Source: www.hackerone.com - Author: luke. When looking for a model to inform your own security posture,...
Hackerone
Lawfully Hacked – Source:www.hackerone.com
Source: www.hackerone.com - Author: Marten Mickos. The best way to prevent getting hacked is to try...
Hackerone
Oath Bug Bounty Program Update: $1M in payouts and expansion of the program – Source:www.hackerone.com
Source: www.hackerone.com - Author: Katrina Dene. This blog was written by Oath CISO and Paranoid in...
Hackerone
Highlights of New York’s Cybersecurity Regulation 23 NYCRR Part 500 – Source:www.hackerone.com
Source: www.hackerone.com - Author: luke. September 4, 2018 - Eighteen month transitional period ends. Covered Entities...
Hackerone
The AWS Shared Responsibility Model: 3 Areas of Improvement to Make Today Part 3: Logging, Monitoring, and Alerting in AWS – Source:www.hackerone.com
Source: www.hackerone.com - Author: Justin Boyer. In the last two parts of this series, we discussed...
Hackerone
Discovering programs is easier than ever with the new and improved Program Directory – Source:www.hackerone.com
Source: www.hackerone.com - Author: Martijn Russchen. Today, we’re excited to announce an overhaul of the HackerOne...
Posts navigation
1
2
3
4
Latest News
The Hacker News
Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware – Source:thehackernews.com
22/04/2025
CSO - Online
IBM X-Force: Stealthy attacks on the rise, toolkits targeting AI emerge – Source: www.networkworld.com
21/04/2025
CSO - Online
Addressing the gaps in modern cloud protection: Using CNAPP to unify cloud security – Source: www.csoonline.com
21/04/2025
CSO - Online
Microsoft SFI update: Five of 28 security objectives nearly complete – Source: www.csoonline.com
21/04/2025
CSO - Online
ASUS patches critical router flaw that allows remote attacks – Source: www.csoonline.com
21/04/2025
CSO - Online
AI in incident response: from smoke alarms to predictive intelligence – Source: www.csoonline.com
21/04/2025