Strong ARM tactics?

HackerOne's new approach includes an Attack Surface Management product to help discover and protect assets.

  • 2 years ago Posted in

HackerOne has launched Attack Resistance Management (ARM) - a new category of security solution that targets the root causes of the attack resistance gap. This gap is caused by incomplete knowledge of digital assets, insufficient testing, and a shortage of the right skills. Attack Resistance Management (ARM) combines attack surface knowledge with the power of ethical hackers to give organizations a true security advantage. To complete ARM, HackerOne announced its HackerOne Assets product, available later this year, which provides discovery and monitoring of all known and unknown assets. 

 

“Attack Resistance Management is crucial to driving down cyber risk,” said Marten Mickos, CEO of HackerOne. “Our customers’ security teams have long benefitted from the insights and expertise of the ethical hacking community. With Attack Resistance Management, those creative insights provide actionable intelligence to developers, operations, and security teams to build secure products and avert cyberattacks in a cost effective manner.” 

 

ARM combines:

 

Security Talent Management - HackerOne brings its existing expertise in the recruitment, vetting, and training of ethical hackers to the approach. The platform ranks hackers and connects organizations to those with the most effective skills for their specific requirements.

 

Reconnaissance and Risk Ranking - HackerOne introduced its Assets product that helps rank the exploitability of vulnerabilities and tackle the riskiest assets first with continuous mapping and prioritization. Assets help customers:

Get global visibility across their attack surface by clearly documenting discovered assets and their associated threats.

Validate and rank asset vulnerabilities using insight from hackers with real-world expertise.

Capitalize on real-time, dynamic responses to their shifting threat environment with continuous discovery and analysis.

HackerOne Assets is expected to be available for purchase in the HackerOne platform this summer.

 

Testing and Triage - In addition to HackerOne’s established testing solutions, from simple spot checks for new features to pentests for compliance, and in-depth security assessments for new applications, its recent acquisition of code review-as-a-service platform, PullRequest, means customers can benefit from expert review at every stage of the development lifecycle. 

 

Skills and Intelligence Creation - The HackerOne platform delivers insights vulnerability data to customers so they can identify, verify and remediate the next likeliest source of security risk in their environment. For customers lacking the in-house expertise, the new Security Advisory Service provides experienced security professionals to better leverage vulnerability data. To complete the intelligence offering, HackerOne delivers red team enrichment, developer education, vulnerability intelligence, scanner rules, and threat modeling with its expanding partner network.

 

"Attack Resistance Management is a fantastic addition to the HackerOne product offering and something we're exploring to continue to mature our engagement with the ethical hacking community,” said Stu Hirst, CISO of Trustpilot. “Ethical hackers have repeatedly proved their value to Trustpilot, finding critical bugs that automated scanning solutions cannot catch. Arming our team with HackerOne’s human insight and combining it with our attack surface management efforts adds another layer of confidence that our attack surface is not just mapped, but covered.”

Acquisition of leading DSPM company will bolster Proofpoint’s human-centric security platform...
NTT DATA’s new Managed Detection & Response service powered by Palo Alto Networks Cortex XSIAM...
SPG is enhancing its cybersecurity capabilities in a new partnership with Saviynt, a leading...
Graylog has unveiled significant security advancements to drive smarter, faster, and more...
Datadog has published its new report, the State of Cloud Security 2024. The report found that...
ISACA research shows automating threat detection/response and endpoint security are the most...
Strategic partnership unifies AI-native endpoint security and next-generation firewall protection...
Advanced forms of social engineering are on the rise, though obvious gaps like weak passwords are...