Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

  • Whitepaper
  • Cloud and Mobile Security

Hacker Powered Security Report

For the past six years, HackerOne is been surveying hackers to learn more about how they see the evolving security testing industry. They combine these insights with the world’s largest dataset of vulnerabilities to identify trends that inform customers how to build an impactful security strategy.

Security automation cannot replace the creativity of humans. In fact, 92% of ethical hackers say they can find vulnerabilities scanners can’t. For the past six years, we’ve been surveying
hackers to learn more about how they see the evolving security testing industry. We combine these insights with the world’s largest dataset of vulnerabilities to identify trends that inform our customers how to build an impactful security strategy.

This year, HackerOne introduced its Attack Resistance Management (ARM) approach that combines attack surface knowledge with the power of ethical hackers to give organizations a true security advantage and target the root causes of the attack resistance gap. The attack resistance gap is the gap between what organizations are able to protect and what they need to protect. The main factors contributing to this gap are incomplete knowledge of digital assets, insufficient testing, and a shortage of the right skills. In the past year, the hacking community has found over 65,000 customer vulnerabilities. 

Reports for vulnerability types typically introduced by digital transformation have seen the most significant growth with misconfigurations growing by 150% and improper authorization by 45%.
In this year’s Hacker-Powered Security Report, we look at what drives the hacking community, what their focus is, and what they’re doing to secure customers.

 

Download the Whitepaper to get more information.

Whitepaper Download - exclusively for registered users

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.