Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Hacker-Powered Pen Tests and the Power of More

by HackerOneJul 07, 2018

Traditional Pen Tests are no longer satisfactory. That's why more and more security teams are turning to Hacker-Powered Pen Tests. As a result, they tap into top talent, and get high-quality reports.

The Pictet Group’s Security in a Digital World - Bounties for Bug Hunters Make The Internet Safer

by HackerOneJul 06, 2018

HackerOne's network of more than 100.000 ethical hackers can help online organisations eradicate vulnerabilities in their internet systems that could be exploited by criminals, says Marten Mickos, its chief Executive Officer

Vulnerability Disclosure Policy (VDP) Basics

by HackerOneJul 06, 2018

There's no hiding from it. If your software or product has an attack surface, a vulnerability will be found by a hacker, security researcher, internal engineer, or random user. Because no system can be entirely free of security issues, it's crucial to provide a clear way for anyone to report vulnerabilities.

How GM Works with Hackers to Enhance Their Security

by HackerOneJul 06, 2018

Jeff Massimilla, Vice President Global Cybersecurity, General Motors and team have been operating their public vulnerability disclosure program with HackerOne for over 2 years. They have such success with their HackerOne Response VDP.

Distributed Defense: How Government Agencies Deploy Hacker-Powered Security

by HackerOneJul 06, 2018

The U.S. Department of Defense runs an ongoing Vulnerability Disclosure Program through HackerOne Response. This case study shows how government organizations like EU Commission, Singapore MINDEF, The Pentagon, and more reap benefits of hacker-powered security.

Cyber Threat Brief: The 2018 FIFA World Cup

by AnomaliJul 03, 2018

Physical and cyber threats have become ubiquitous at large sporting events.

Given its popularity and global affiliation, the 2018 FIFA World Cup is exactly the kind of event that could attract hooliganism, terrorism, cybercrime and other security threats. This report explains the main physical and cyber concerns to watch for at the 2018 FIFA World Cup coupled with expert analysis of each threat's severity and likelihood.

Whether you're in Russia for the games or watching from your

Cyber Threat Landscape: The Healthcare Industry

by AnomaliJul 03, 2018

Healthcare organizations have made the news in recent years after becoming victims of cyber attacks.

Unique aspects present in the healthcare industry make it a valuable target to cybercriminals and nation-states alike. Understanding the nature of the threats to the healthcare industry helps define effective ways to counter these threats and help to prevent them from making future headlines.

The Anomali Threat Landscape Report on the Healthcare Industry covers the following

The State of IT and Cybersecurity

by Dark ReadingJun 10, 2018

As cybersecurity has grown and become more critical in recent years, it increasingly has become viewed as a discipline separate from general IT. In many companies, the security department works independently of the IT department; in some companies, the chief information security officer (CISO) reports to someone other than the head of IT.

This report from Dark Reading shows today's IT groups play a critical role in information security — a role that is more extensive and more

Cybersecurity Strategies for the Digital Era

by InformationWeekJun 11, 2018

This InformationWeek Trend Report explores several areas of information security that are critical to ensuring the growth of the modern business.

• Learn how cybersecurity initiatives can contribute to new business growth
• Find out how digital and physical security must work together and read our 4-step plan for implementation
• Explore strategies for integrating DevOps into IT security to improve application security and performance

The Essential Guide to Blocking Malware Without a SOC

by BarklyJun 11, 2018

Learn how to break the most popular attack chains and sabotage criminals' favorite malware infection techniques. Get access to quick wins and checklists inside.



Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs. Anomali's approach enables detection at every point along the kill chain, making it impossible to mitigate threats before material damage to your organization has occurred.


Headquarters: Boston

Protect endpoints the smarter way. Advance your endpoint security with the strongest, smartest protection.

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


From implementing the basics of a vulnerability disclosure process to supercharging your existing security programs via a bug bounty program, HackerOne has you covered.


Headquarters: 2 Penn Plaza, 15th Floor, New York, NY, 10121 United States

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.