Introducing container image scanning: no agents, no blind spots

Introducing container image scanning: no agents, no blind spots

Agentless container image scanning. Automatically discover and continuously scan your container images across AWS, Azure, and Google Cloud. No agents, no blind spots.
The cloud isn't secure by default: what containers changed about risk

The cloud isn't secure by default: what containers changed about risk

Containers made it easier to ship fast — and easier to ship risk. Intruder's VP of Product breaks down where container risk comes from across the full security lifecycle, and what
Overconfident and under resourced: navigating the midmarket security gap

Overconfident and under resourced: navigating the midmarket security gap

Too complex for SMB tools, too lean for enterprise stacks - midmarket security teams are stuck in the middle. New research reveals how bad the gap really is.
Registry vs. runtime: where to scan your container images

Registry vs. runtime: where to scan your container images

Container image scanning should happen at the registry level, not at runtime inside clusters. Centralized registry scanning gives teams full visibility, reduces operational overhea
The Vulnerabulletin Issue #5

The Vulnerabulletin Issue #5

Issue 5 of our monthly newsletter, packed with research, industry news and Intruder updates.
The Vulnerabulletin Issue #4

The Vulnerabulletin Issue #4

Issue 4 of our monthly newsletter, packed with research, industry news and Intruder updates.
Beyond Compliance: What Actually Builds Customer Trust

Beyond Compliance: What Actually Builds Customer Trust

Compliance frameworks help you pass an audit; continuous compliance helps you keep customer confidence.
See TODAY’S CVE TRENDS
Clear all filters
Intruder Vulnerability Bulletin — MySQL Privilege Escalation Vulnerabilities

Intruder Vulnerability Bulletin — MySQL Privilege Escalation Vulnerabilities

You may have heard of two new MySQL vulnerabilities in the news over the past couple of days (CVE-2016–6662 & CVE-2016–6663).
Vulnerabilities and Threats
What’s the point in phishing assessments?

What’s the point in phishing assessments?

As news is released that PhishMe made £45 million last year, it’s clear that phishing assessments have become very popular. But it begs the…
Insights
I’m a startup, what should I do about security?

I’m a startup, what should I do about security?

Being a startup is difficult. You don’t have the budget to do everything like a big corporate, but if you don’t appear to be doing things…
Insights
Days of Cyber: What’s an SME to do? (Threat Landscape)

Days of Cyber: What’s an SME to do? (Threat Landscape)

This will be the first in a series of blog posts exploring the world of cyber security, with a specific view on how it applies to SMEs; and…
Insights
Badlock Vulnerability — Pre-Release Analysis

Badlock Vulnerability — Pre-Release Analysis

It seems that merely releasing a vulnerability with a cool logo and marketing budget isn’t enough these days. Like the movie studio behind…
Vulnerabilities and Threats
DROWN Vulnerability — More Like A Doggy Paddle

DROWN Vulnerability — More Like A Doggy Paddle

You may have heard of the new DROWN vulnerability as it’s been in the news a fair bit over the past couple of days.
Vulnerabilities and Threats
Should the data on my server be encrypted?

Should the data on my server be encrypted?

Over the last few days I’ve heard a lot of questions in the media asking why TalkTalk didn’t have their customer data encrypted.
Insights
VENOM Explained

VENOM Explained

Over the last few days there’s been a lot of hype surrounding the recently released (and patched) VENOM vulnerability. This post hopes to…
Vulnerabilities and Threats
GregAI: Your Intruder AI Security Analyst

GregAI: Your Intruder AI Security Analyst

We’re excited to introduce GregAI, your AI security analyst copilot that streamlines security workflows by prioritizing issues, validating findings, and more.
Product
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.