Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud

HackerOne: 2.1M Security Researchers Walk Into a Conference Booth…

Truth in IT
05/05/2025
51
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at RSAC 2025 live. There's 25,000 people here. We hear lots of people going on at the show. Lots of themes from, uh, vulnerability to new features to AI that were going on here. But we are here right now standing with HackerOne . I've got Paul. Paul, welcome. Hey, thank you very much. Nice to be here. Uh, let's talk about HackerOne, then. Just because we're here, uh, you guys are, uh, kind of a leader in security. Tell us a little bit about what that means and what more specifically you do. Yeah, absolutely. So we absolutely are a leader in security. Uh, we have the largest community of ethical hackers, about 2.1 million and counting. And what we do is we utilize this amazing skill set that we have in this diverse bench of ethical hackers to actively hack on assets and find vulnerabilities before the bad guys do. Uh, so we're most known for our bug bounty program, and we're actually the leader in that space. All right. Are people motivated to do this just out of the kindness of their hearts? Are they? I mean, you mentioned a bounty. Or is this something that people find as a challenge mentally? What's going on with that? That hacker mindset? It is a challenge mentally, but mainly organizations are coming to us because they're terrified that they're going to suffer a breach, right. And in some instances they have suffered a breach. So we can use this ethical hacking community to find those vulnerabilities before the bad guys do. The ethical hackers that participate on our platform actually receive a bounty or a small payment for finding that? And it gives them a chance to form a really great relationship with that, with that community and the organization as well. We do have an offering as well, VDP Vulnerability Disclosure Program. It's a see something, say something program. So in that instance, we just want to be the mechanism for ethical researchers to be able to report to organizations. They don't get paid for that, but they can still get really, really great findings from the from the environment. All right. We're looking around at this show with all these people coming by and everything. How are you recruiting here? Are you trying to generate interest? What goes on here for you guys? A little bit of a a little bit of b yeah. So we've had some of our ethical research community come by. Our hackers, if you will. Um, sometimes they want to just hear about our developments, our advancements. You know, what else can the platform do for them? You know, a lot of them earn a really great living on the platform. We've also had organizations, current customers and prospects come by wanting to know what's new at HackerOne . You know, how can you help me with my AI chatbot? You know, I'm terrified of being breached. So it's really great to see the excitement here. And so far, the engagement's been really, really great at the booth. Yeah. Speaking of sort of the trends, AI is obviously a big trend here in adoption. So how is that affecting your community? Are you seeing more people using AI in ethically, unethically or more people using AI for good? How is that working out? Well, on our side, we're absolutely seeing people use AI for good, right? And hacker wants no stranger to that either. We've developed an internal AI chatbot named High High for HackerOne AI that's for our organizations, and it can help automate a lot of the typically manual processes in the platform. And we really want to make the the different offerings that we have as easy as possible for the organizations to consume. So HackerOne is proactively using AI to provide benefit to the organizations that are using us. We are also seeing ethical researchers build their own tools to do things like discover vulnerabilities. And obviously AI is just a huge tool for that as well. So it's it's happening on both sides of the table. Really good race. If you wanted to get one message out to everyone here at the show, sort of and say, like, if you had the big microphone, what would you tell them? I would tell them to come by the HackerOne booth, talk to our wonderful team up front, grab a cup of coffee, come back here and see a demo, and learn more about what ethical hacking can do for you. And we can talk you through all of these programs, and we can help you figure out how to make your environment much, much safer. All right. Well, thank you so much, Paul. Thank you for talking to us today. Appreciate it. Thank you so much. All right. Check it out. And what's the website again? HackerOne .com. HackerOne .com. Take care.
HackerOne taps into a 2.1 million-strong army of security researchers to identify vulnerabilities before bad actors strike. They lead the bug bounty world and also run VDP programs for zero-pay disclosures. AI is both a tool and a threat, and HackerOne embraces both sides with their internal HackerOne AI security agent, Hai. Real hackers. Real results. Real caffeine.
Categories:
  • » Cybersecurity » Data Security
  • » Cybersecurity » Application Security
  • » Small World Big Data
  • » Cybersecurity
  • » Cybersecurity » Zero Trust
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • hackerone
  • bug
  • bounty
  • ethical
  • hacking
  • vdp
  • crowdsourced
  • security
  • penetration
  • testing
  • ai
  • threats
  • responsible
  • disclosure
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: HackerOne: 2.1M Security Researchers Walk Into a Conference Booth…

            Upcoming Spotlight Events

            • Sep
              11

              Cyera: An Executive’s Guide to Secure AI Adoption

              09/11/202501:00 PM ET
              More events

              Upcoming 360 View Events

              • Sep
                25

                360View: Email Security & Social Engineering Defense

                09/25/202512:00 PM ET
                • Oct
                  23

                  360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure

                  10/23/202512:00 PM ET
                  • Nov
                    20

                    360View: Budget Optimization: Doing More with Less

                    11/20/202512:00 PM ET
                    More events

                    Upcoming Industry Events

                    • Aug
                      26

                      Renown Health Secures 10K Mailboxes & Stops $1M+ in Email Threats (Abnormal Security Webinar)

                      08/26/202501:00 PM ET
                      • Sep
                        16

                        HUMAN Security: CISO to CISO: A HUMAN conversation about Artificial Intelligence

                        09/16/202501:00 PM ET
                        • Sep
                          18

                          Trend Micro Webinar: Risk in Real Time: Agentic SIEM

                          09/18/202511:00 AM ET
                          More events

                          Recent Industry Events

                          • Aug
                            25

                            Cyera: Harnessing AI to Transform the Landscape of Data Security

                            08/25/202510:55 AM ET
                            • Aug
                              19

                              Secureframe: CMMC 2.0 Insights: Understanding Compliance from an Expert Auditor's Perspective

                              08/19/202512:00 PM ET
                              • Aug
                                13

                                Wallarm: Understanding the Limitations of WAFs and API Gateways Against Modern Threats

                                08/13/202501:00 PM ET
                                More events

                                Upcoming Events Calendar

                                • 08/26/2025
                                  01:00 PM
                                  08/26/2025
                                  Renown Health Secures 10K Mailboxes & Stops $1M+ in Email Threats (Abnormal Security Webinar)
                                  https://www.truthinit.com/index.php/channel/1404/renown-health-secures-10k-mailboxes-stops-1m-in-email-threats/
                                • 09/11/2025
                                  01:00 PM
                                  09/11/2025
                                  Cyera: An Executive’s Guide to Secure AI Adoption
                                  https://www.truthinit.com/index.php/channel/1374/an-executives-guide-to-secure-ai-adoption/
                                • 09/16/2025
                                  01:00 PM
                                  09/16/2025
                                  KnowBe4: Beyond DMARC: Closing Critical Gaps in Your Email Security Shield
                                  https://www.truthinit.com/index.php/channel/1403/beyond-dmarc-closing-critical-gaps-in-your-email-security-shield/
                                • 09/16/2025
                                  01:00 PM
                                  09/16/2025
                                  HUMAN Security: CISO to CISO: A HUMAN conversation about Artificial Intelligence
                                  https://www.truthinit.com/index.php/channel/1411/ciso-to-ciso-a-human-conversation-about-artificial-intelligence/
                                • 09/18/2025
                                  11:00 AM
                                  09/18/2025
                                  Trend Micro Webinar: Risk in Real Time: Agentic SIEM
                                  https://www.truthinit.com/index.php/channel/1372/risk-real-time-agentic-siem/
                                • 09/25/2025
                                  12:00 PM
                                  09/25/2025
                                  360View: Email Security & Social Engineering Defense
                                  https://www.truthinit.com/index.php/channel/930/360view-email-security-social-engineering-defense/
                                • 10/23/2025
                                  12:00 PM
                                  10/23/2025
                                  360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure
                                  https://www.truthinit.com/index.php/channel/931/360view-preventing-data-exfiltration-keeping-enterprise-data-secure/
                                • 11/20/2025
                                  12:00 PM
                                  11/20/2025
                                  360View: Budget Optimization: Doing More with Less
                                  https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
                                • 12/18/2025
                                  12:00 PM
                                  12/18/2025
                                  360View: 2026 IT Predictions & Emerging Trends
                                  https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/
                                Truth in IT
                                • Sponsor
                                • About Us
                                • Terms of Service
                                • Privacy Policy
                                • Contact Us
                                • Preference Management
                                Desktop version
                                Standard version