AS Watson’s Chief Information Security Officer (CISO), Feliks Voskoboynik, explains how ethical hackers have helped with digital transformation and enabled his team to harden their attack surface. Read on to learn Feliks’ advice on including a bug bounty program as part of a security strategy, the lessons ethical hackers have provided, and what best practices he can share with other CISOs.
Other content in this Stream
HackerOne Bug Bounty helps minimize your threat exposure by leveraging a legion of ethical hackers to provide preemptive and continuous oversight for your expanding digital landscape.
Insights from our customers & the world's top hackers—emerging threats, vulnerability rankings, & fighting cybercrime on a budget
The Bug Bounty Field Manual is the definitive guide on how to plan, launch, and operate a successful bug bounty program. But 10,283 words is a lot to read so we've turned it into a simple...
Spiraling inflation and the pervading security skills gap have security leaders struggling to keep up. Our new eBook outlines strategies gathered from 50+ leaders.
Recently updated for 2023 and packed with incredible insights, the latest version of The Security Leader's Handbook is a must-have resource for cybersecurity leaders like you.
Jedox was recently named a Leader in the Gartner Magic Quadrant for Financial Planning Software. One criterion related to being named to the Leader quadrant is how mature an organization is when...
Each year, we celebrate the GitHub Security Bug Bounty program, highlighting impressive bugs and researchers, rewards, live hacking events, and more. This year, we celebrate a new milestone: 10...
What Is an Ethical Hacker?An ethical hacker is a cybersecurity professional who uses their skills and knowledge in hacking to identify vulnerabilities and weaknesses in computer systems, networks,...
1. Are You Prepared to Manage Incoming Vulnerability Reports?Naturally, the purpose of running a bug bounty program is to identify vulnerabilities beyond what your security team can find — and...