AWS Cloud Security Explained: What’s Left Exposed?

AWS Cloud Security Explained: What’s Left Exposed?

Think AWS has your security covered? Not entirely. This blog breaks down what AWS doesn’t secure, real-world risks you’re responsible for, and key actions you can take.
Cloud security
AWS Security Services: What They Do and Don’t Do

AWS Security Services: What They Do and Don’t Do

AWS security services help protect your cloud, but they don’t secure everything. See what’s missing and how Intruder goes further to simplify cloud security.
Cloud security
Azure Cloud Security: The Critical Vulnerabilities You’re Responsible For

Azure Cloud Security: The Critical Vulnerabilities You’re Responsible For

Avoid costly cloud mistakes. Learn which Azure vulnerabilities you’re responsible for - and how Intruder helps you fix them fast.
Cloud security
Clear all filters
Penetration Testing vs Vulnerability Scanning

Penetration Testing vs Vulnerability Scanning

What is the main difference between vulnerability scanning and penetration testing? People frequently confuse the two, but there is a very important distinction.
Penetration testing
AWS Penetration Testing: A CTO's Guide

AWS Penetration Testing: A CTO's Guide

Considering AWS penetration testing? There are many options available, and knowing what you need will help you make your security budget go as far as possible.
Penetration testing
OpenVAS vs. Nessus - A Comprehensive Analysis

OpenVAS vs. Nessus - A Comprehensive Analysis

OpenVAS and Nessus are two of the most widely adopted vulnerability scanners with a shared history. We have provided a comprehensive comparison of how they measure up.
Vulnerability scanning
Intruder is a G2 Best Software Award Winner for 2023

Intruder is a G2 Best Software Award Winner for 2023

Intruder has been included in two categories in G2's Best Software Awards 2023 - Best Security Products and Best UK Software Companies.
In the News
What is an internal pen test and how is it carried out?

What is an internal pen test and how is it carried out?

This time in our series on the different types of penetration test, we’re covering “Internal” pen tests, otherwise known as “Internal…
Penetration testing
What is an external pentest and how is it carried out?

What is an external pentest and how is it carried out?

External penetration testing (also known as external network penetration testing) is a security assessment of an organization's perimeter systems.
Penetration testing
Top SaaS cybersecurity threats in 2023: are you ready?

Top SaaS cybersecurity threats in 2023: are you ready?

Focus on these key areas to secure your environments and safeguard your success in 2023. Make sure you're only in the news when you want to be.
Vulnerabilities and Threats
Vulnerability Scanning Frequency Best Practices

Vulnerability Scanning Frequency Best Practices

A vulnerability scanning program is crucial for avoiding data breaches. But how often you should run scans? Read more for our vulnerability scanning frequency best practices.
Vulnerability scanning
Product Update: Continuous Network Scanning

Product Update: Continuous Network Scanning

We’re excited to announce more enhancements to our continuous network scanning with new features to Network View, continuous scanning and an even better UX.
Product
Security Update: OpenSSL High Vulnerability (CVE-2022-3602)

Security Update: OpenSSL High Vulnerability (CVE-2022-3602)

The OpenSSL project has pre-announced a new and critical vulnerability that will be fixed in OpenSSL version 3.0.7, expected 1 November 2022. Updates to this announcement will ...
Vulnerabilities and Threats
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.