How a New HackerOne Integration with AWS Security Hub Accelerates Vulnerability Remediation Time
The ICO’s 12-Step Guide to GDPR Compliance
Hack The Pentagon Turns One on HackerOne
Key Findings From The Hacker-Powered Security Report: It’s Not Just For Tech (1 of 6)
Discover more with topics that matter to you most.
Application Security
Learn how to prevent vulnerabilities in your applications. We cover current practices in application security, cloud security, API testing, and more.
Ethical Hacker
Ethical hackers, pentesters, and security researchers. We explain everything you need to know about them and how they can help your organization.
Company News
Stay informed of HackerOne partnerships, integrations, hackathon results, and other developments that keep HackerOne customers two steps ahead of cybercriminals.
Blogs From HackerOne's CEO
Read insights from HackerOne Chief Executive Officer Marten Mickos.
Penetration Testing
Follow the latest practices in penetration testing, including API testing, application testing, external networks, internet-facing infrastructure, and more.
Security Compliance
From FedRAMP to GDPR, we’ll help you understand the security requirements of every compliance and regulatory standard. Learn how you can prove compliance.
Vulnerability Management
We cover everything in vulnerability management including discovery, prioritization, assessment, disclosure, and remediation.
![Pentest as a Service (PTaaS)](https://www.hackerone.com/sites/default/files/styles/card_default_3_col/public/2024-04/PTaaS_BlogImage5.jpg.webp?itok=-b-LHdxn)
Pre-Pentest Checklist Part 1: Essential Questions to Answer Before Your Next Pentest
![Penetration testing](https://www.hackerone.com/sites/default/files/styles/card_default_3_col/public/2024-03/Blog Header_pentest effectiveness 763x462%402x_0.png.webp?itok=6GDz4xUo)
Decoding the Characteristics of Modern Pentesting: Effectiveness
![Abstract imagery depicting pentest speed](https://www.hackerone.com/sites/default/files/styles/card_default_3_col/public/2024-02/Pentest Speed Blog Header 763x462%402x.png.webp?itok=hSYN5bJT)
Decoding the Characteristics of Modern Pentesting: Speed
![Abstract 3D textures](https://www.hackerone.com/sites/default/files/styles/card_default_3_col/public/2024-01/Blog Header_Pentester AMA Recap 763x462.png.webp?itok=m6Mfq-V9)
Recap: Elite Pentesters Tell All in a Live Q&A
![HackerOne named a "Leader" in the 2023 GigaOm PTaaS Radar Report](https://www.hackerone.com/sites/default/files/styles/card_default_3_col/public/2023-12/Blog Header_GigaOm PTaaS Blog 763x462.png.webp?itok=AhR0iQN5)
Interpret the 2023 GigaOm PTaaS Radar Report with HackerOne
![Black hole with pink color overlay](https://www.hackerone.com/sites/default/files/styles/card_default_3_col/public/2023-11/Blog Header_Bug Bounty vs Pentesting 763x462.png.webp?itok=bExkT_RH)
What Is the Difference Between Pentesting and Bug Bounty?
![Spencer Chin speaking about pentesting at Black Hat 2023](https://www.hackerone.com/sites/default/files/styles/card_default_3_col/public/2023-08/You%27re Doing Pentesting Wrong Header.png.webp?itok=fwxpXLPk)
You're Doing Pentesting Wrong
![Security leaders in application security](https://www.hackerone.com/sites/default/files/styles/card_default_3_col/public/HAC_Blog_100 Conversations_Featured_560x494_L1R1.png.webp?itok=p-WaSv1Y)