We’re excited to announce that we’re joining HackerOne! We’ll work together to build developer-first security solutions that help organizations innovate faster while increasing resistance to attacks. Learn more: https://lnkd.in/gzqNpteW
关于我们
Code review from top engineers powered by AI.
- 网站
-
https://www.pullrequest.com/
PullRequest的外部链接
- 所属行业
- 软件开发
- 规模
- 11-50 人
- 总部
- Austin,TX
- 类型
- 私人持股
- 创立
- 2017
- 领域
- Code Review、Code Audits、Code Security和Cybersecurity
地点
-
主要
720 Brazos Street
Suite 1200
US,TX,Austin,78701
PullRequest员工
动态
-
PullRequest转发了
How does code security back out to business value? If preventative security is obviously right, why is proving ROI so hard? Because ROI is the wrong framework. Arguments rely on speculation and fear: cost savings by avoiding?unexpected?losses. Business value for pre-production security controls is a combination of return on mitigation (RoM) and cost of remediation. And to make it work, security needs to adapt to how developers work. Not the other way around.
Want to save time, money, and stress when catching security flaws? The key is uncovering code flaws before the programs go out to the public. In our recent blog, HackerOne expert Dan Mateer explains how security leaders use HackerOne PullRequest to uncover potential security vulnerabilities throughout the SDLC in a developer-first approach that is actionable, fast, and efficient. ??Learn more here: https://bit.ly/3EVYhZS
-
-
PullRequest转发了
In 2022, the HackerOne team set out to mend the rifts between security and development teams. This work is changing the way these teams work together. ?? Read our latest post to learn how HackerOne PullRequest combines human expertise with thoughtfully deployed AI to eliminate blockers and drive efficiency where it's needed the most. https://bit.ly/4awVaTT
-
-
PullRequest转发了
To all of my friends in India - HackerOne is looking for Technical Engagement Managers to join our team! Come work with very smart people to build big, impactful things. https://lnkd.in/gzVxr88S
-
PullRequest转发了
此处无法显示此内容
在领英 APP 中访问此内容等
-
PullRequest转发了
The most under-noted challenge in running a penetration test is retesting and remediation: the work that comes after. At HackerOne we've prioritized building tools that help you get issues fixed and strong evidence they're fixed. Things like: - Flexibility to get retests on individual, or all findings, as-needed. - Diff code review of patches prior to deployment without even connecting repositories. - PDF exports of individual findings with lifecycle timestamps and evidence of remediation. - Our security-first AI co-pilot: Hai. For things like analyzing image attachments and expanding on prescriptive recommendations when you prompt it with conditions. More: https://lnkd.in/gf6NEnuS
-
-
“We are thrilled to welcome HackerOne as a CREST-accredited company... By achieving accreditation for their penetration testing (pentesting) services, HackerOne’s customers can be reassured that they meet the very highest standards." - Rowland Johnson President of CREST https://lnkd.in/g4kJVMe2
-
A beautiful and concise checklist for preparing for a 3rd party penetration test by Piyush V.. https://lnkd.in/gDwwKWgb 1. What is the scope? 2. What are your success criteria for the pentest? 3. What key areas would you want the pentester(s) to focus on? 4. What type of pentest would you like done? 5. What type of environment does the pentest need to be conducted on? 6. What restrictions (if any) need to be applicable? 7. What credentials/certifications should the pentester(s) possess? 8. What type of deliverables do you need out of this pentest? 9. What are your internal timelines to fix Critical and High severity vulnerabilities?
-