Introducing container image scanning: no agents, no blind spots

Introducing container image scanning: no agents, no blind spots

Agentless container image scanning. Automatically discover and continuously scan your container images across AWS, Azure, and Google Cloud. No agents, no blind spots.
The cloud isn't secure by default: what containers changed about risk

The cloud isn't secure by default: what containers changed about risk

Containers made it easier to ship fast — and easier to ship risk. Intruder's VP of Product breaks down where container risk comes from across the full security lifecycle, and what
Overconfident and under resourced: navigating the midmarket security gap

Overconfident and under resourced: navigating the midmarket security gap

Too complex for SMB tools, too lean for enterprise stacks - midmarket security teams are stuck in the middle. New research reveals how bad the gap really is.
Registry vs. runtime: where to scan your container images

Registry vs. runtime: where to scan your container images

Container image scanning should happen at the registry level, not at runtime inside clusters. Centralized registry scanning gives teams full visibility, reduces operational overhea
The Vulnerabulletin Issue #5

The Vulnerabulletin Issue #5

Issue 5 of our monthly newsletter, packed with research, industry news and Intruder updates.
The Vulnerabulletin Issue #4

The Vulnerabulletin Issue #4

Issue 4 of our monthly newsletter, packed with research, industry news and Intruder updates.
Beyond Compliance: What Actually Builds Customer Trust

Beyond Compliance: What Actually Builds Customer Trust

Compliance frameworks help you pass an audit; continuous compliance helps you keep customer confidence.
See TODAY’S CVE TRENDS
Clear all filters
What is Network Penetration Testing? When & How to Start Tests

What is Network Penetration Testing? When & How to Start Tests

We explain what network penetration testing involves, which type is best for your needs, and more.
Penetration testing
Why new navigation has improved our user experience

Why new navigation has improved our user experience

Our portal and dashboard is now even easier to use.
Product
28 cyber security stats and facts you need to know in 2023

28 cyber security stats and facts you need to know in 2023

Discover the scale of today's cyber security challenges and how to stay ahead with our top tips.
Insights
Intruder launches continuous attack surface monitoring to reduce exposure

Intruder launches continuous attack surface monitoring to reduce exposure

Our new premium plan offering takes vulnerability management to the next level with continuous coverage, increasing visibility and transparency of external attack surfaces.
In the News
7 Top API Security Tools for 2026: Reviews & Key Features

7 Top API Security Tools for 2026: Reviews & Key Features

Knowing where your APIs are, and understanding how to protect them, is more important than ever.
Application security
Top online port scanners and how they work [2026]

Top online port scanners and how they work [2026]

Open ports are a gateway to your systems. Find the right tools to check which ports are secure, and which ports attackers can exploit.
Insights
Intruder Joins Google Cloud Partner Advantage

Intruder Joins Google Cloud Partner Advantage

Intruder has integrated its attack surface management platform with Google Cloud to help businesses protect their cloud systems.
In the News
The Importance Of Vulnerability Scanning For SOC 2 Audits

The Importance Of Vulnerability Scanning For SOC 2 Audits

We’re now SOC 2 Type 2 certified, with the help of our own vulnerability scanner.
Compliance
How much does penetration testing cost in 2026?

How much does penetration testing cost in 2026?

Understand how penetration tests are quoted and find out what to look out for when choosing a vendor.
Penetration testing
5 essential cybersecurity tools for 2026

5 essential cybersecurity tools for 2026

Whether you’re a tech start-up or scaling business, you can easily protect your digital systems and data in just few simple steps with powerful, cost-effective tools.
Vulnerability scanning
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.