VDP Guide for Financial Services
Other content in this Stream
Security Leaders Handbook
A guide for making meaningful progress on improving your security posture
Worldwide Security Coverage for Unlimited Reach
Cybercriminals aren’t bound by borders, resulting in nearly $600 billion in losses every year. Hackers are your best defense against risks.
Vulnerability Disclosure Policy. What is it. Why you need one. How to get started.
This three-part series answers all your questions on VDP best practices.
Vulnerability Disclosure Policy Basics: 5 Critical Components
12-page booklet providing advice for creating a vulnerability disclosure page - along with great quotes about why this matters.
Guidance for Financial Product: Product: Services on Vulnerability Disclosure Policy Basics
Specific to Finserv on details needed to implement a complete and compliant policy. Takes the VDP guide and updates with finserv intro and Goldman Sachs policy example
The Beginners' Guide to Hacker-Powered Security
17-page booklet that highlights how hacker-powered security can work alongside established security efforts.
Secure from the Start: The Complete Guide for Entrepreneurs
Secure from the Start: The Complete Guide for Entrepreneurs summarizes the key security topics that every technology entrepreneur needs to understand.
The Hacker-Powered Security Report 2018: Financial Product: Product: Services + Insurance
Vulnerability data and hacker-powered security adoption metrics for the financial services industry.
Next-Gen Solutions: Application Security Launch Effective Agile Security for Agile Development
Improving application security by incorporating bug bounties and crowdsourced pen tests into DevOps pipeline.
Top 20 Public Bug Product: Bounty Programs
In this list, you’ll see which programs on the HackerOne platform ranked highest on the total amount of bounties awarded to hackers over the life of the program.
7 Common Security Pitfalls to Avoid When Migrating to the Cloud
12-page booklet that defines the most common security pitfalls when migrating to the cloud and how to prevent security regression.