Cyber security aggregate rss news

Cyber security aggregator - feeds history

 Government

The final National Defense Authorization Act for fiscal 2025, released on Saturday, scraps much of the language proposed earlier this year by the House and Senate to require the Pentagon to commission an independent study focused solely on creating a U.S. Cyber Force as a potential seventh military branch.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: johnk. HackerOne Brand Ambassadors are leaders who have a passion to bring the community together in their local city or region. We are excited to announce the first group of ambassadors who were chosen because of their natural passion for hacking and building community.   show more ...

Whether they’re an avid bug bounty hunter, […] La entrada Announcing the HackerOne Brand Ambassadors – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: HackerOne. This year has seen a rapid acceleration in the American government’s efforts to secure federal and state cyber infrastructure. This momentum has continued with the unanimous passing of the Internet of Things Cybersecurity Improvement Act. Like NIST SP 800-53,   show more ...

which was published earlier this year, the bill highlights the crucial […] La entrada US Government Mandates Vulnerability Disclosure for IoT – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: HackerOne. Leaderboards are a fun way to measure your hacking progress and understand how you compare to the broader HackerOne community and to engage through competition. Historically, we’ve had only one type of leaderboard that ranked based on accrued reputation. With   show more ...

this release, our goal is to empower hackers by giving […] La entrada Announcing new leaderboards: More ways to engage, compete and win – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: HackerOne. For customers and hackers, the triage experience is central to hacker-powered security. Our triagers consist of a globally distributed team of security analysts that triage vulnerabilities across HackerOne customers. We understand that success is achieved by   show more ...

balancing feedback received across all stakeholders, and our newest feature release, triage ratings, exemplifies […] La entrada HackerOne is Excited to Launch Triage Ratings for Customers and Hackers – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: HackerOne. Back in 2005, the Computer Security Resource Center (CRSC) published NIST 800-53: the “Security and Privacy Controls for Information Systems and Organizations” publication. This Special Publication contains valuable guideposts for organizations looking to   show more ...

reduce risk. However, its last iteration, Revision 4, was released in April 2013. It was well past […] La entrada NIST Overhauls “Security and Privacy Controls” and Emphasizes VDP as a Best Practice – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: HackerOne. As a popular camera and messaging platform, Snapchat is responsible for properly handling data for 249 million users daily. The Snap bug bounty program launched in January 2015 to encourage hackers to surface vulnerabilities so they could be safely resolved. Nearly   show more ...

six years later, the security team leverages insights and […] La entrada Snap’s Security Team on Nearly 6 Years of Collaborating with Hackers – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: HackerOne. In times of uncertainty, security becomes an ever more pressing priority. The stakes are high: organizations are more reliant on technology than ever and anyone relying on technology can lose everything in a data breach. But some of the most recent vulnerabilities   show more ...

have one thing in common: they were detected, […] La entrada Organizations Paid Hackers $23.5 Million for These 10 Vulnerabilities in One Year – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: HackerOne. Revealed at Security@, HackerOne adds PagerDuty, ServiceNow, Splunk, SumoLogic to advance workflows HackerOne, the world’s most trusted hacker-powered security platform, today introduced a set of strategic integrations and partnerships that make it easy to   show more ...

integrate HackerOne data with existing security and development workflows. Announced at the fourth annual Security@ conference, […] La entrada HackerOne Expands Integrations Ecosystem to Connect and Defend Customers – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: HackerOne. We’re excited to announce our integration with ServiceNow Incident Management. This integration allows customers to escalate vulnerability reports with ServiceNow incidents and synchronize any updates in the vulnerability workflow that happen in ServiceNow or   show more ...

HackerOne.  Manual processes, multiple cross-team hand-offs, and constant vacillation between security tools hinder a team’s ability […] La entrada HackerOne Integrates with ServiceNow to Streamline Vulnerability Lifecycle Management – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: HackerOne. AT&T Communications recently celebrated its first anniversary on HackerOne, passing $1 million in payouts to more than 850 researchers worldwide. The HackerOne program is a progression from AT&T’s previous, self-administered program that offered a   show more ...

limited number of payouts each quarter. It now offers a wider digital footprint for vulnerability discovery, […] La entrada AT&T Celebrates $1 Million Awarded to Hackers in One Year – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.troyhunt.com – Author: Troy Hunt Sponsored by: A super quick intro today as I rush off to do the next very Dubai thing: drive a Lambo through the desert to go dirt bike riding before jumping in a Can-Am off-roader and then heading to the kart track for a couple of afternoon sessions. I […] La   show more ...

entrada Weekly Update 429 – Source: www.troyhunt.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: HackerOne. Penetration testing is a good baseline for evaluating system vulnerabilities and an industry best practice that supports routine security hygiene. Many companies also use traditional pentests to pass vendor assessments and meet compliance standards like HITRUST,   show more ...

SOC 2 and ISO 27001. But by themselves, pentests aren’t enough to demonstrate security […] La entrada Pentesting Beyond Compliance: A Tool to Improve Your Security Posture – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: Rana Robillard. This year, the Juneteenth holiday gained wider global recognition. At HackerOne, we kicked off our inaugural Juneteenth celebration with a day of learning, reflection and unified commitment to action. Our goal was to give our people insightful ‘aha’   show more ...

moments and conclude with commitments that advance equality and inclusion. There is […] La entrada What Juneteenth Means at HackerOne – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: johnk. We’re pleased to announce some enhancements to how Reputation, Signal, and Impact are calculated. These changes will be applied going forward (not applied retroactively) and align with requests and recommendations from you, the amazing community of hackers.     show more ...

What’s changing at a high level?For current definitions of Reputation, Signal, and Impact […] La entrada Reputation, Signal & Impact Calculation Enhancements – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: johnk. “It’s not worth building a fence if it can be bypassed just two steps to the side” Mail.ru Group is a bug bounty veteran; with a program that spans 6 years, paying out over $1 million in bounties and resolving 3465 valid reports, it knows all the tricks to   show more ...

getting […] La entrada Mail.ru Group pays out over $1 million in bounties – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: HackerOne. Congratulations to @mayonaise, the ninth hacker to earn $1 Million hacking for good on the HackerOne platform!  Over the past 2 years, @mayonaise has helped to find over 170 real-world vulnerabilities in enterprise and government organizations, earned his place as   show more ...

a live hacking event MVH (most valuable hacker), and holds […] La entrada Mayonaise Joins The Ranks of The Seven-Figure-Earning Hackers – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: HackerOne. June is widely recognized as Pride month –an  important moment to pause, celebrate, and support our community, employees and friends in the LGBTQIA+ community. We are encouraging employees to share personal stories and show how they’re keeping the spirit   show more ...

of Pride this year. Virtual events, smaller neighborhood events, and individual […] La entrada Celebrating Pride at HackerOne – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: johnk. What are Penetration Tests? Penetration testing is one of the most widely used techniques for complying with security regulations and protecting networks, computing systems, and users.  In a penetration test, or pentest for short, authorized hackers simulate an attack   show more ...

on specific applications, networks, or sites to assess their security. A […] La entrada What to Look For in a Penetration Testing Company – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: HackerOne. This guest post is authored by Geoff Norton, Senior Director Software Engineering at PlayStation, and was originally published on PlayStation’s blog. At PlayStation, we are committed to providing gamers all over the world with great experiences. I’m happy to   show more ...

announce today that we have started a public PlayStation Bug Bounty […] La entrada Announcing the PlayStation Bug Bounty Program – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: HackerOne. Starting this Friday, June 19th will become HackerOne’s annual Day for Action. For Black Americans and communities of color around the globe, Juneteenth is a day of celebration and reflection, commemorating the emancipation of the last remaining slaves in the US.   show more ...

Going forward, we will use this Day of Action […] La entrada Juneteenth: HackerOne’s Day for Action – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: HackerOne. Zendesk, Inc. (NYSE: ZEN) is one of the fastest-growing customer support platforms in the world. With over 150,000 customer accounts representing nearly every industry across 160 counties, Zendesk is held to the highest security standards and complex data   show more ...

compliance requirements. For that reason, security has been a priority from the […] La entrada Scaling & Prioritizing Product Security with Zendesk – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

2024-12
Aggregator history
Sunday, December 08
SUN
MON
TUE
WED
THU
FRI
SAT
DecemberJanuaryFebruary