“If you're going into a bush blind, you don't know what's going to happen.”
"The ideal end-state is that bug bounties become a regular, common tool in securing all IT assets across the Department of Defense. We will always have security vulnerabilities. We can approach that reality one of two ways: we can deny it, or we can be proactive, open to it and use every tool in our toolbox to remediate or mitigate them."
“HackerOne programs are a fundamental part of our cybersecurity strategy.”
"HackerOne is a well-known platform across the information security community which aggregates the most successful bug bounty programs to date."
"The flexibility of the platform and depth of the HackerOne community has made it a perfect fit for GoodRx."
"Security bugs are going to be reported and they’re going to throw a wrench in your plans for the sprint/ month/quarter."
"We are employing strategies and programs, like our VDP with HackerOne, with the sole purpose of protecting our customers, their vehicles and their data."
"The program has been successful because of the continued contributions from diverse, talented researchers."
"We take advantage of the triaging services to help with our workload."
"If our bug bounty program can find at least one critical vulnerability per quarter for two or three quarters in a row, we know the program is worth the money we spend on it."
"Working with HackerOne, we have had a solid return on investment while reducing risk. Zebra has scaled our security program across the different product offerings within HackerOne from security assessments for product releases, bug bounty for continuous testing, and a mechanism for third-party security researchers to submit vulnerabilities."
"A greater amount of diverse vulnerabilities allows us to identify and improve our SDL more efficiently and to keep learning new trends and approaches about vulnerabilities, new attack vectors, and blind spots."
"Bug bounty programs are an important part of the modern software development lifecycle."
"The program overview delivers contextual data across our vulnerability life cycle, allowing us to view trends and patterns over time so we can identify gaps and optimize our program."
“We'll definitely add HackerOne to our security portfolio and leverage hacker-powered security services in the future.”