James Harrison

Senior Content Writer

James Harrison

's Posts

Clear all filters
Web Application Security Testing: Essential Guide

Web Application Security Testing: Essential Guide

Learn how to check for web app security vulnerabilities using testing tools and keep your web application secure from hackers.
Application security
Top Dynamic Application Security Testing (DAST) tools [2026]

Top Dynamic Application Security Testing (DAST) tools [2026]

Find the right tools to identify vulnerabilities in your running applications by simulating threats easily accessed by external hackers.
Vulnerability scanning
Web Application Penetration Testing Guide: Tools & Techniques

Web Application Penetration Testing Guide: Tools & Techniques

Explore the methodology, scope, and types of web application penetration testing in 2024. Learn to identify & address web app vulnerabilities & security threats.
Application security
What is Continuous Monitoring? How It Works & Getting Started

What is Continuous Monitoring? How It Works & Getting Started

Your network is always changing. Continuous monitoring provides real-time visibility into vulnerabilities so you can fix them faster. Learn about what it is and how to get started.
Attack surface management
8 Top Vulnerability Scanning Tools for 2026

8 Top Vulnerability Scanning Tools for 2026

Compare the top vulnerability scanning tools for 2025 including free, open source and SaaS-based vulnerability scanners to help keep your company secure.
Vulnerability scanning
Metrics matter: why we've added analytics to show your progress

Metrics matter: why we've added analytics to show your progress

See your progress over time with a suite of new analytics in your Intruder dashboard.
Product
Cybersecurity Compliance: How to Become Compliant in 6 Steps

Cybersecurity Compliance: How to Become Compliant in 6 Steps

Robust cybersecurity is more than best practice, it’s often a regulatory requirement. Here’s everything you need to know about the major compliance requirements.
Compliance
11 Best Asset Discovery Tools For 2026

11 Best Asset Discovery Tools For 2026

Asset discovery is the first step in managing your attack surface. Find out our top asset discovery tool recommendations.
Attack surface management
Security compliance 101 with Intruder and Secureframe

Security compliance 101 with Intruder and Secureframe

Highlights of our latest webinar on how to achieve security compliance. Read for top tips on achieving compliance and find out how easy it can be with the right tools.
Compliance
What is vulnerability management?

What is vulnerability management?

Vulnerability management is essential to protecting your business against threats. Find out all you need to know and how to get started.
Vulnerability management
What is penetration testing? The ultimate guide

What is penetration testing? The ultimate guide

We'll walk you through everything you need to know about penetration testing to power up your cyber security.
Penetration testing
How to build a resilient remote-working business

How to build a resilient remote-working business

How to reduce the digital risks of remote working, including the red team experience of Product Lead, Andy Hornegold.
Insights
Building a Vulnerability Management Program in 4 Steps

Building a Vulnerability Management Program in 4 Steps

One of the biggest challenges today is the lack of effective vulnerability management. But it doesn't need to be difficult if you follow our step by step guide.
Vulnerability management
What is cloud penetration testing? Best practices & methods

What is cloud penetration testing? Best practices & methods

Find out what's involved in cloud penetration testing, including best practices for your test.
Cloud security
8 takeaways from M-Trends 2023

8 takeaways from M-Trends 2023

Mandiant’s annual report has important insights from the cybersecurity frontline. No time to read it? We've got all the key findings for you.
Insights
Vulnerability scanning: how often should I scan?

Vulnerability scanning: how often should I scan?

It’s easy to say continuous vulnerability scanning, but we’re here to help you figure out why it’s important, and what it actually means.
Vulnerability scanning
What is Network Penetration Testing? When & How to Start Tests

What is Network Penetration Testing? When & How to Start Tests

We explain what network penetration testing involves, which type is best for your needs, and more.
Penetration testing
28 cyber security stats and facts you need to know in 2023

28 cyber security stats and facts you need to know in 2023

Discover the scale of today's cyber security challenges and how to stay ahead with our top tips.
Insights
7 Top API Security Tools for 2026: Reviews & Key Features

7 Top API Security Tools for 2026: Reviews & Key Features

Knowing where your APIs are, and understanding how to protect them, is more important than ever.
Application security
Top online port scanners and how they work [2026]

Top online port scanners and how they work [2026]

Open ports are a gateway to your systems. Find the right tools to check which ports are secure, and which ports attackers can exploit.
Insights
Introducing fully informed API scanning

Introducing fully informed API scanning

Eliminate risks to vulnerable APIs in development, perform rapid scans to accelerate innovation, and get actionable remediation advice to secure your APIs.
Product
All you need to know about API security

All you need to know about API security

APIs are everywhere and agile innovation isn't possible unless they're secure.
Application security
Everything you need to know about cyber insurance

Everything you need to know about cyber insurance

Cyber insurance won’t protect you from cybercrime, but it can provide financial security if you’re attacked. In this guide we’ll explain what cyber insurance covers.
Insights
Linux vulnerability scanner: How to get started

Linux vulnerability scanner: How to get started

Linux powers up to 90% of the internet so keeping on top of vulnerabilities should be a priority for every developer.
Vulnerability scanning
Windows vulnerability scanner: How to get started

Windows vulnerability scanner: How to get started

76% of desktops and 20% of servers run on Windows, so scanning for vulnerabilities of this huge attack surface is critical for most businesses today.
Vulnerability scanning
Streamlining the chaos of vulnerability management

Streamlining the chaos of vulnerability management

When Product Lead, Andy Hornegold, was asked to speak at DTX Europe, he used the Optus breach in Australia to show how vulnerability scanning could ...
Vulnerability management
Does the OWASP Top 10 still matter?

Does the OWASP Top 10 still matter?

What is the OWASP Top 10, and – just as important – what is it not? Find out how you can make the report work for your business
Application security
No results found
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.