News
![Women in Cybersecurity: We Talk to Ethical Hacker Chenny Ren](http://myhackertech.com/cdn/shop/articles/5268605495e9256b211d2dd16c68bf3b_{width}x.jpg?v=1617667573)
Listen It's time for more ‘Stories from Cybersecurity’! At MyHackerTech we want to celebrate the diversity in the cybersecurity industry by sharing the inspirational stories of the people in the industry. With the IT security industry booming, many prospective IT professionals...
Continue reading
![SFCS: We Talk to HackerOne's Bug Bounty Advisor Rena Chua](http://myhackertech.com/cdn/shop/articles/e31e0ed4b369d09e16b7cafee2522e3b_{width}x.jpg?v=1617667727)
We continue our Stories From Cybersecurity Series by talking to Rena Chua from HackerOne. Rena shares her story and recommends resources for new hackers.
Continue reading
![SFCS: We Interview Aaron Zander, Head of IT at HackerOne](http://myhackertech.com/cdn/shop/articles/a003dbc3abb6c08f995851822f51f7ab_{width}x.jpg?v=1617667744)
Next up in our Stories From Cybersecurity series, we have an interview with Aaron Zander, Head of IT at HackerOne. HackerOne is a leading bug bounty solutions provider that is dedicated to helping organizations improve their cybersecurity through ethical hacking....
Continue reading
![SFCS: We Talked To LINE Security Engineer Robin Lunde](http://myhackertech.com/cdn/shop/articles/99bd075996618e1e42e73e209a6d508f_{width}x.jpg?v=1617667739)
This week we talked Robin Lunde, Security Engineer at LINE. We wanted to learn more about Robin's journey into cybersecurity as well as get his take on current issues in the industry. LINE is one of the most popular messaging...
Continue reading
![We Talk to Security Engineer Laurie Mercer - "Together We Can Build a Safer Internet!"](http://myhackertech.com/cdn/shop/articles/e7e337bcf3a9c2a84a97d4b10888cbd8_{width}x.jpg?v=1617667807)
This week we had the pleasure of talking to Laurie Mercer, Security Solutions Engineer at vulnerability coordination and bug bounty platform, HackerOne. Security Engineers are tasked with designing and building systems that remain dependable against malicious cyber attacks, vulnerabilities,...
Continue reading