Logo YesWeHack
Blog
LoginContact Us

Best Practices

  1. Blog
  2. Best Practices
EU flag signifies NIS 2 entering into force and the Cyber Resilience Act being adopted

NIS 2 in force, Cyber Resilience Act adopted, CISA hails VDP impact – OffSec roundup for CISOs

Read More ->
YesWeHack vulnerability triage chief Adrien Jeanneau on the art of triaging bug bounty vulnerability reports in this YesWeHack interview

‘Happy hunters equal happy customers and vice versa’: YesWeHack vulnerability triage chief Adrien Jeanneau on creating a virtuous Bug Bounty circle

Read More ->
Servers with mess of wires plugged in in an example of tech sprawl

Tackling tech sprawl, CISO burnout, NIS 2 now enforceable – OffSec roundup for CISOs

Read More ->
EU flag on parliament building with text on left side of image: "NIS 2 Enters into force"

The NIS 2 Directive is now enforceable: What are the implications for vulnerability management?

Read More ->
The Windows blue screen of death took down an estimated 8.5 million Windows machines following a botched CrowdStrike software update.

Partial SolarWinds reprieve, CrowdStrike lessons, LLM kryptonite – OffSec roundup for CISOs

Read More ->
EU flags

NIS 2 in brief, security tech hype cycle, Italy’s first ever live Bug Bounty – OffSec roundup for CISOs

Read More ->
EU flag on parliament building with text on left side of image: "NIS 2 Enters into force"

The NIS 2 Directive is now enforceable: What are the implications for vulnerability management?

Apple declines to pay Kaspersky vuln reward, Bug Bounty ‘extortion’ dispute, Microsoft Recall backlash – OffSec roundup for CISOs

Read More ->

Countdown to NIS 2 compliance: Key insights and implications for your SecOps strategy

Read More ->
Man wearing black smart watch

UK PSTI Act: ‘World first’ IoT security rules offer reminder of VDP virtues

Read More ->

Apple declines to pay Kaspersky vuln reward, Bug Bounty ‘extortion’ dispute, Microsoft Recall backlash – OffSec roundup for CISOs

US SEC cybersecurity rules, SolarWinds charges and security testing

US SEC cyber rules, SolarWinds CISO charges: How a unified OffSec strategy can enhance your SEC disclosures

Read More ->
9 rules for a successful first-time Bug Bounty Program

9 rules for a successful first-time Bug Bounty Program

Read More ->
Bug bounty misconceptions

Busting Bug Bounty misconceptions

Read More ->
US SEC cybersecurity rules, SolarWinds charges and security testing

US SEC cyber rules, SolarWinds CISO charges: How a unified OffSec strategy can enhance your SEC disclosures

Previous
2/5
12345
Next

Footer

Logo YesWeHack
Logo YesWeHack

Products

  • Bug Bounty
  • Vulnerability Disclosure Policy
  • Pentest Management
  • Attack Surface Management
  • Live Hacking Events

Researchers

  • Start Hunting
  • Public Programs
  • Tools
  • Ranking
  • Dojo

Resources

  • Blog
  • Case Studies
  • Videos
  • Help Center
  • API
  • Github
  • Newsletter

Company

  • About YesWeHack
  • Trust & Security
  • Career
  • Press
  • Events
  • Contact

Follow us

Linkedin White
Twitter Logo
Youtube White
GitHub, YesWeHack

©2025 YESWEHACK

  • Legal Notices
  • Privacy Policy
  • Cookies Policy
  • Change Cookie Preferences