Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybersecurity Funding

HackerOne Secures $9 Million, Appoints Katie Moussouris Chief Policy Officer

Vulnerability disclosure platform HackerOne has secured $9 million in a Series A round of funding, and has appointed Katie Moussouris, former senior security strategist lead at Microsoft, as the company’s chief policy officer.

Vulnerability disclosure platform HackerOne has secured $9 million in a Series A round of funding, and has appointed Katie Moussouris, former senior security strategist lead at Microsoft, as the company’s chief policy officer.

As chief policy officer, Moussouris will be responsible for the company’s vulnerability disclosure philosophy, and she’ll work to promote and legitimize security research among organizations, legislators and policy makers, HackerOne has revealed. 

At Microsoft, Moussouris led the Security Community Outreach and Strategy team responsible for the company’s bounty programs and the BlueHat conference. Microsoft’s Vulnerability Research program was also founded by Moussouris.

HackerOne was founded by Alex Rice, the company’s CTO and the man behind Facebook’s bug bounty program, and Merijn Terheggen, who has been named CEO. HackerOne became known in November 2013 when it announced hosting the Internet Bug Bounty project funded by Microsoft and Facebook. The project’s goal has been to make the Internet safer by offering cash rewards to security researchers who discover vulnerabilities in popular software applications.

The funding round was led by early stage venture capital firm, Benchmark Capital. Benchmark General Partner Bill Gurley and Lookout Mobile Security Founder John Hering have joined the HackerOne board of directors.

“This is a fascinating company with an innovative solution to an increasingly critical problem. Moreover, the vibrancy we see in the HackerOne community is quite similar to what we have seen with other community/marketplaces we have backed including ebay, Yelp, OpenTable, Zillow and Uber,” Gurley wrote on his blog.

“HackerOne is a true win-win, researchers are rewarded for their unique skills, and companies are able to identify vulnerabilities in a way that limits repercussions for their users,” Gurley noted.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.