Checkmarx announced a new generation in software supply chain security with its Secrets Detection and Repository Health solutions to minimize application risk.
HackerOne is enhancing its product capabilities to help global organizations easily scale their security and mitigate security risks where traditional security tools fall short.
Applications built on cloud infrastructure services are complex and change constantly, which makes securing cloud workloads and services at scale nearly impossible when relying on disparate tooling. HackerOne’s new set of product capabilities provide organizations the visibility, context, and on-demand access to skilled security experts required to secure cloud workloads, investigate anomalous activity or meet compliance requirements all in one place.
These latest developments provide organizations across industries and attack surfaces with access to a suite of tools to:
■ Secure the design, development, and deployment of applications with:
- HackerOne Assessments: From web applications to mobile to application program interfaces (APIs) to cloud to network security, HackerOne Assessments go beyond automated tools and processes. Organizations can determine the scope of the assessment and recruit researchers with specific skills.
- HackerOne vulnerability insights: Leverage this hacker-powered vulnerability intelligence tool to get a snapshot of risk during a given time, track key areas within vulnerability lifecycles, and benchmark results against past tests and industry peers.
■ Accelerate vulnerability discovery, prioritization, and remediation with:
- Advanced workflows: Plan, build, test, manage, and evolve workflows with custom triggers, tailored recommendations, and intelligent pattern matching. HackerOne advanced workflows empower customers to create automated processes that trigger actions based on the criticality of vulnerabilities, along with bi-directional syncs that update data and records between key platforms including GitHub, Jira, ServiceNow, Microsoft Azure DevOps and the rest of their tech stack, and more.
- Remediation guidance: Access remediation advice for each vulnerability found to aid in understanding and resolving of vulnerability reports.
■ Bolster program efficiencies with:
- Attestation reports: With the expanded suite of controls in NIST 800-53 Revision 5, organizations are now required to present evidence of a functional vulnerability disclosure process to maintain compliance. Attestation reports make that a single click for your compliance team. Customers can view program metrics with comprehensive reports to uncover mean time to remediation (MTTR), level of vulnerability criticality, and prove compliance.
- Embedded submission forms: Enterprise clients will now have the ability to white label their embedded submission forms to seamlessly integrate their Vulnerability Disclosure Program (VDP) into their brand experience.
- Hacker custom fields: Achieve the flexibility to add additional fields and customize submission forms to collect more information from researchers, including version numbers, browser used, IP address, and more.
- Hacker communication: Improve hacker communication with video capture capabilities that allow researchers to provide contextual, reproducible steps to help validate vulnerabilities and remediations. For organizations with strict regulatory or privacy requirements, HackerOne Clear provides vetted and background checked researchers.
- Hacker collaboration: Enable multiple hackers to work together on reports, increasing the likelihood of valid submissions in cloud infrastructure, severe findings, and higher bounties for hackers.
“Organizations are migrating to the cloud at a faster pace than ever before,” said HackerOne CTO and Co-Founder Alex Rice. “Promises of increased speed and agility powered by the latest technology are driving the need for security to adapt to new digital business demands. With adoption comes risk,” Rice continues. “And the key to defending against evolving threats is speed. Limiting the time of exposure and reducing mean time to detect and respond is integral to protecting everyone's data as it moves to the cloud. Hackers empower you to do just that.”
Industry News
SmartBear has appointed Dan Faulkner, the company’s Chief Product Officer, as Chief Executive Officer.
Horizon3.ai announced the release of NodeZero™ Kubernetes Pentesting, a new capability available to all NodeZero users.
Veracode acquired certain assets of Phylum, including its malicious package analysis, detection, and mitigation technology.
AppViewX announced the completion of its acquisition by Haveli Investments.
Check Point® Software Technologies Ltd. has been recognized as a Leader in the 2024 Gartner® Magic Quadrant™ for Email Security Platforms (ESP).
Progress announced its partnership with the American Institute of CPAs (AICPA), the world’s largest member association representing the CPA profession.
Kurrent announced $12 million in funding, its rebrand from Event Store and the official launch of Kurrent Enterprise Edition, now commercially available.
Blitzy announced the launch of the Blitzy Platform, a category-defining agentic platform that accelerates software development for enterprises by autonomously batch building up to 80% of software applications.
Sonata Software launched IntellQA, a Harmoni.AI powered testing automation and acceleration platform designed to transform software delivery for global enterprises.
Sonar signed a definitive agreement to acquire Tidelift, a provider of software supply chain security solutions that help organizations manage the risk of open source software.
Kindo formally launched its channel partner program.
Red Hat announced the latest release of Red Hat Enterprise Linux AI (RHEL AI), Red Hat’s foundation model platform for more seamlessly developing, testing and running generative artificial intelligence (gen AI) models for enterprise applications.
Fastly announced the general availability of Fastly AI Accelerator.