Platform
Vulnerability Management
Scan, prioritize, remediate
AI Security Automation
Act faster
Attack Surface Management
Detect changes and hidden assets
Integrations
Compliance and workflow management
Cloud Security
Daily config checks
Solutions
External Scanning
Infrastructure security
Attack Surface Monitoring
Respond to changes
DAST
Secure web apps
Website Security
140k+ checks
Risk Based Prioritization
No more alert fatigue
API Security
Test your APIs
Asset Discovery
Reveal unknown targets
Emerging Threat Detection
Check and act fast
CSPM
Daily cloud config checks
Compliance
SOC 2, ISO, HIPAA, DORA
Cyber Hygiene Reporting
Demonstrate progress
Internal Scanning
Secure employee devices
Case Studies
Pricing
Resources
Free Tools
cvemon
Vulnerability intel
Autoswagger
Check for API auth flaws
Security
Security Research
Insights from our experts
Cyber Resource Hub
Guides & videos
Cyber Glossary
Learn the lingo
Customers
Help Center
FAQs & tutorials
Developer Hub
APIs & integrations
Trust Center
Security & compliance
Company
About Intruder
History and mission
Press
News and interviews
Partner Program
Become a reseller
Careers
Work with us
Contact
Get in touch
Try free
Log in
Log in
Try for free
James Harrison
Senior Content Writer
James Harrison
's Posts
Guides
Insights
In the News
Product
Vulnerabilities and Threats
DevOps Security
Cloud security
Application security
Compliance
Attack surface management
Vulnerability management
Vulnerability scanning
Penetration testing
Clear all filters
Web Application Security Testing: Essential Guide
Learn how to check for web app security vulnerabilities using testing tools and keep your web application secure from hackers.
James Harrison
|
min read
February 11, 2024
|
min read
Application security
Top Dynamic Application Security Testing (DAST) tools [2026]
Find the right tools to identify vulnerabilities in your running applications by simulating threats easily accessed by external hackers.
James Harrison
|
min read
February 6, 2024
|
min read
Vulnerability scanning
Web Application Penetration Testing Guide: Tools & Techniques
Explore the methodology, scope, and types of web application penetration testing in 2024. Learn to identify & address web app vulnerabilities & security threats.
James Harrison
|
min read
February 2, 2024
|
min read
Application security
What is Continuous Monitoring? How It Works & Getting Started
Your network is always changing. Continuous monitoring provides real-time visibility into vulnerabilities so you can fix them faster. Learn about what it is and how to get started.
James Harrison
|
min read
February 1, 2024
|
min read
Attack surface management
8 Top Vulnerability Scanning Tools for 2026
Compare the top vulnerability scanning tools for 2025 including free, open source and SaaS-based vulnerability scanners to help keep your company secure.
James Harrison
|
min read
February 1, 2024
|
min read
Vulnerability scanning
Metrics matter: why we've added analytics to show your progress
See your progress over time with a suite of new analytics in your Intruder dashboard.
James Harrison
|
min read
January 18, 2024
|
min read
Product
Cybersecurity Compliance: How to Become Compliant in 6 Steps
Robust cybersecurity is more than best practice, it’s often a regulatory requirement. Here’s everything you need to know about the major compliance requirements.
James Harrison
|
min read
January 8, 2024
|
min read
Compliance
11 Best Asset Discovery Tools For 2026
Asset discovery is the first step in managing your attack surface. Find out our top asset discovery tool recommendations.
James Harrison
|
min read
December 1, 2023
|
min read
Attack surface management
Security compliance 101 with Intruder and Secureframe
Highlights of our latest webinar on how to achieve security compliance. Read for top tips on achieving compliance and find out how easy it can be with the right tools.
James Harrison
|
min read
October 23, 2023
|
min read
Compliance
What is vulnerability management?
Vulnerability management is essential to protecting your business against threats. Find out all you need to know and how to get started.
James Harrison
|
min read
October 9, 2023
|
min read
Vulnerability management
What is penetration testing? The ultimate guide
We'll walk you through everything you need to know about penetration testing to power up your cyber security.
James Harrison
|
min read
August 22, 2023
|
min read
Penetration testing
How to build a resilient remote-working business
How to reduce the digital risks of remote working, including the red team experience of Product Lead, Andy Hornegold.
James Harrison
|
min read
August 17, 2023
|
min read
Insights
Building a Vulnerability Management Program in 4 Steps
One of the biggest challenges today is the lack of effective vulnerability management. But it doesn't need to be difficult if you follow our step by step guide.
James Harrison
|
min read
August 10, 2023
|
min read
Vulnerability management
What is cloud penetration testing? Best practices & methods
Find out what's involved in cloud penetration testing, including best practices for your test.
James Harrison
|
min read
July 19, 2023
|
min read
Cloud security
8 takeaways from M-Trends 2023
Mandiant’s annual report has important insights from the cybersecurity frontline. No time to read it? We've got all the key findings for you.
James Harrison
|
min read
July 13, 2023
|
min read
Insights
Vulnerability scanning: how often should I scan?
It’s easy to say continuous vulnerability scanning, but we’re here to help you figure out why it’s important, and what it actually means.
James Harrison
|
min read
June 15, 2023
|
min read
Vulnerability scanning
What is Network Penetration Testing? When & How to Start Tests
We explain what network penetration testing involves, which type is best for your needs, and more.
James Harrison
|
min read
May 11, 2023
|
min read
Penetration testing
28 cyber security stats and facts you need to know in 2023
Discover the scale of today's cyber security challenges and how to stay ahead with our top tips.
James Harrison
|
min read
May 5, 2023
|
min read
Insights
7 Top API Security Tools for 2026: Reviews & Key Features
Knowing where your APIs are, and understanding how to protect them, is more important than ever.
James Harrison
|
min read
May 2, 2023
|
min read
Application security
Top online port scanners and how they work [2026]
Open ports are a gateway to your systems. Find the right tools to check which ports are secure, and which ports attackers can exploit.
James Harrison
|
min read
April 24, 2023
|
min read
Insights
Introducing fully informed API scanning
Eliminate risks to vulnerable APIs in development, perform rapid scans to accelerate innovation, and get actionable remediation advice to secure your APIs.
James Harrison
|
min read
March 30, 2023
|
min read
Product
All you need to know about API security
APIs are everywhere and agile innovation isn't possible unless they're secure.
James Harrison
|
min read
March 8, 2023
|
min read
Application security
Everything you need to know about cyber insurance
Cyber insurance won’t protect you from cybercrime, but it can provide financial security if you’re attacked. In this guide we’ll explain what cyber insurance covers.
James Harrison
|
min read
February 21, 2023
|
min read
Insights
Linux vulnerability scanner: How to get started
Linux powers up to 90% of the internet so keeping on top of vulnerabilities should be a priority for every developer.
James Harrison
|
min read
February 16, 2023
|
min read
Vulnerability scanning
Windows vulnerability scanner: How to get started
76% of desktops and 20% of servers run on Windows, so scanning for vulnerabilities of this huge attack surface is critical for most businesses today.
James Harrison
|
min read
February 16, 2023
|
min read
Vulnerability scanning
Streamlining the chaos of vulnerability management
When Product Lead, Andy Hornegold, was asked to speak at DTX Europe, he used the Optus breach in Australia to show how vulnerability scanning could ...
James Harrison
|
min read
October 20, 2022
|
min read
Vulnerability management
Does the OWASP Top 10 still matter?
What is the OWASP Top 10, and – just as important – what is it not? Find out how you can make the report work for your business
James Harrison
|
min read
October 5, 2022
|
min read
Application security
No results found
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Sign up for your free 14-day trial
Start today