Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud

HackerOne: 2.1M Security Researchers Walk Into a Conference Booth…

Truth in IT
05/05/2025
51
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at RSAC 2025 live. There's 25,000 people here. We hear lots of people going on at the show. Lots of themes from, uh, vulnerability to new features to AI that were going on here. But we are here right now standing with HackerOne . I've got Paul. Paul, welcome. Hey, thank you very much. Nice to be here. Uh, let's talk about HackerOne, then. Just because we're here, uh, you guys are, uh, kind of a leader in security. Tell us a little bit about what that means and what more specifically you do. Yeah, absolutely. So we absolutely are a leader in security. Uh, we have the largest community of ethical hackers, about 2.1 million and counting. And what we do is we utilize this amazing skill set that we have in this diverse bench of ethical hackers to actively hack on assets and find vulnerabilities before the bad guys do. Uh, so we're most known for our bug bounty program, and we're actually the leader in that space. All right. Are people motivated to do this just out of the kindness of their hearts? Are they? I mean, you mentioned a bounty. Or is this something that people find as a challenge mentally? What's going on with that? That hacker mindset? It is a challenge mentally, but mainly organizations are coming to us because they're terrified that they're going to suffer a breach, right. And in some instances they have suffered a breach. So we can use this ethical hacking community to find those vulnerabilities before the bad guys do. The ethical hackers that participate on our platform actually receive a bounty or a small payment for finding that? And it gives them a chance to form a really great relationship with that, with that community and the organization as well. We do have an offering as well, VDP Vulnerability Disclosure Program. It's a see something, say something program. So in that instance, we just want to be the mechanism for ethical researchers to be able to report to organizations. They don't get paid for that, but they can still get really, really great findings from the from the environment. All right. We're looking around at this show with all these people coming by and everything. How are you recruiting here? Are you trying to generate interest? What goes on here for you guys? A little bit of a a little bit of b yeah. So we've had some of our ethical research community come by. Our hackers, if you will. Um, sometimes they want to just hear about our developments, our advancements. You know, what else can the platform do for them? You know, a lot of them earn a really great living on the platform. We've also had organizations, current customers and prospects come by wanting to know what's new at HackerOne . You know, how can you help me with my AI chatbot? You know, I'm terrified of being breached. So it's really great to see the excitement here. And so far, the engagement's been really, really great at the booth. Yeah. Speaking of sort of the trends, AI is obviously a big trend here in adoption. So how is that affecting your community? Are you seeing more people using AI in ethically, unethically or more people using AI for good? How is that working out? Well, on our side, we're absolutely seeing people use AI for good, right? And hacker wants no stranger to that either. We've developed an internal AI chatbot named High High for HackerOne AI that's for our organizations, and it can help automate a lot of the typically manual processes in the platform. And we really want to make the the different offerings that we have as easy as possible for the organizations to consume. So HackerOne is proactively using AI to provide benefit to the organizations that are using us. We are also seeing ethical researchers build their own tools to do things like discover vulnerabilities. And obviously AI is just a huge tool for that as well. So it's it's happening on both sides of the table. Really good race. If you wanted to get one message out to everyone here at the show, sort of and say, like, if you had the big microphone, what would you tell them? I would tell them to come by the HackerOne booth, talk to our wonderful team up front, grab a cup of coffee, come back here and see a demo, and learn more about what ethical hacking can do for you. And we can talk you through all of these programs, and we can help you figure out how to make your environment much, much safer. All right. Well, thank you so much, Paul. Thank you for talking to us today. Appreciate it. Thank you so much. All right. Check it out. And what's the website again? HackerOne .com. HackerOne .com. Take care.
HackerOne taps into a 2.1 million-strong army of security researchers to identify vulnerabilities before bad actors strike. They lead the bug bounty world and also run VDP programs for zero-pay disclosures. AI is both a tool and a threat, and HackerOne embraces both sides with their internal HackerOne AI security agent, Hai. Real hackers. Real results. Real caffeine.
Categories:
  • » Cybersecurity » Data Security
  • » Cybersecurity » Application Security
  • » Small World Big Data
  • » Cybersecurity
  • » Cybersecurity » Zero Trust
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • hackerone
  • bug
  • bounty
  • ethical
  • hacking
  • vdp
  • crowdsourced
  • security
  • penetration
  • testing
  • ai
  • threats
  • responsible
  • disclosure
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: HackerOne: 2.1M Security Researchers Walk Into a Conference Booth…

            Upcoming Spotlight Events

            • Sep
              11

              An Executive’s Guide to Secure AI Adoption

              09/11/202501:00 PM ET
              More events

              Upcoming 360 View Events

              • Sep
                25

                360View: Email Security & Social Engineering Defense

                09/25/202512:00 PM ET
                • Oct
                  23

                  360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure

                  10/23/202512:00 PM ET
                  • Nov
                    20

                    360View: Budget Optimization: Doing More with Less

                    11/20/202512:00 PM ET
                    More events

                    Upcoming Industry Events

                    • Aug
                      19

                      CMMC 2.0 Insights: Understanding Compliance from an Expert Auditor's Perspective

                      08/19/202512:00 PM ET
                      • Aug
                        21

                        Risk in Real Time: Visibility Into Cloud Based Vulnerabilities

                        08/21/202511:00 AM ET
                        • Aug
                          25

                          Harnessing AI to Transform the Landscape of Data Security

                          08/25/202510:55 AM ET
                          More events

                          Recent Industry Events

                          • Aug
                            13

                            Understanding the Limitations of WAFs and API Gateways Against Modern Threats

                            08/13/202501:00 PM ET
                            • Jul
                              23

                              Enhancing API Security Testing: Identifying Vulnerabilities Ahead of Deployment

                              07/23/202501:00 PM ET
                              • Jul
                                10

                                Discover the Latest Features of Netwrix 1Secure for MSPs

                                07/10/202501:00 PM ET
                                More events

                                Upcoming Events Calendar

                                • 08/19/2025
                                  12:00 PM
                                  08/19/2025
                                  CMMC 2.0 Insights: Understanding Compliance from an Expert Auditor's Perspective
                                  https://www.truthinit.com/index.php/channel/1401/cmmc-2-0-insights-understanding-compliance-from-an-expert-auditors-perspective/
                                • 08/21/2025
                                  11:00 AM
                                  08/21/2025
                                  Risk in Real Time: Visibility Into Cloud Based Vulnerabilities
                                  https://www.truthinit.com/index.php/channel/1372/understanding-dynamic-risk-management-in-real-time-environments/
                                • 08/25/2025
                                  10:55 AM
                                  08/25/2025
                                  Harnessing AI to Transform the Landscape of Data Security
                                  https://www.truthinit.com/index.php/channel/1381/harnessing-ai-to-transform-the-landscape-of-data-security/
                                • 08/26/2025
                                  10:55 AM
                                  08/26/2025
                                  Confronting AI’s Challenges: Insights into CISOs' Biggest Concerns
                                  https://www.truthinit.com/index.php/channel/1380/confronting-ai-s-challenges-insights-into-cisos-biggest-concerns/
                                • 08/26/2025
                                  01:00 PM
                                  08/26/2025
                                  Renown Health Secures 10K Mailboxes & Stops $1M+ in Email Threats
                                  https://www.truthinit.com/index.php/channel/1404/renown-health-secures-10k-mailboxes-stops-1m-in-email-threats/
                                • 08/27/2025
                                  10:55 AM
                                  08/27/2025
                                  Mastering Secure AI Implementation: A Comprehensive Executive Guide
                                  https://www.truthinit.com/index.php/channel/1379/mastering-secure-ai-implementation-a-comprehensive-executive-guide/
                                • 08/28/2025
                                  10:55 AM
                                  08/28/2025
                                  A Practitioner’s Roadmap for Safeguarding AI Implementation in Organizations
                                  https://www.truthinit.com/index.php/channel/1378/a-practitioner-s-roadmap-for-safeguarding-ai-implementation-in-organizations/
                                • 08/29/2025
                                  10:55 AM
                                  08/29/2025
                                  Ethical Frameworks and Compliance Strategies for Safe AI Implementation
                                  https://www.truthinit.com/index.php/channel/1377/ethical-frameworks-and-compliance-strategies-for-safe-ai-implementation/
                                • 09/11/2025
                                  01:00 PM
                                  09/11/2025
                                  An Executive’s Guide to Secure AI Adoption
                                  https://www.truthinit.com/index.php/channel/1374/an-executives-guide-to-secure-ai-adoption/
                                • 09/16/2025
                                  01:00 PM
                                  09/16/2025
                                  Beyond DMARC: Closing Critical Gaps in Your Email Security Shield
                                  https://www.truthinit.com/index.php/channel/1403/beyond-dmarc-closing-critical-gaps-in-your-email-security-shield/
                                • 09/25/2025
                                  12:00 PM
                                  09/25/2025
                                  360View: Email Security & Social Engineering Defense
                                  https://www.truthinit.com/index.php/channel/930/360view-email-security-social-engineering-defense/
                                • 10/23/2025
                                  12:00 PM
                                  10/23/2025
                                  360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure
                                  https://www.truthinit.com/index.php/channel/931/360view-preventing-data-exfiltration-keeping-enterprise-data-secure/
                                • 11/20/2025
                                  12:00 PM
                                  11/20/2025
                                  360View: Budget Optimization: Doing More with Less
                                  https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
                                • 12/18/2025
                                  12:00 PM
                                  12/18/2025
                                  360View: 2026 IT Predictions & Emerging Trends
                                  https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/
                                Truth in IT
                                • Sponsor
                                • About Us
                                • Terms of Service
                                • Privacy Policy
                                • Contact Us
                                • Preference Management
                                Desktop version
                                Standard version