AWS Cloud Security Explained: What’s Left Exposed?

AWS Cloud Security Explained: What’s Left Exposed?

Think AWS has your security covered? Not entirely. This blog breaks down what AWS doesn’t secure, real-world risks you’re responsible for, and key actions you can take.
Cloud security
AWS Security Services: What They Do and Don’t Do

AWS Security Services: What They Do and Don’t Do

AWS security services help protect your cloud, but they don’t secure everything. See what’s missing and how Intruder goes further to simplify cloud security.
Cloud security
Azure Cloud Security: The Critical Vulnerabilities You’re Responsible For

Azure Cloud Security: The Critical Vulnerabilities You’re Responsible For

Avoid costly cloud mistakes. Learn which Azure vulnerabilities you’re responsible for - and how Intruder helps you fix them fast.
Cloud security
Clear all filters
Validate and Remediate Faster With In-Platform Commenting

Validate and Remediate Faster With In-Platform Commenting

Intruder now lets teams comment directly on issues and occurrences, keeping remediation context in one place. The result: faster fixes and shorter exposure to risk.
Product
The Vulnerabulletin Issue #2

The Vulnerabulletin Issue #2

Issue 2 of our monthly newsletter, packed with research, industry news and Intruder updates.
NCSC Web Check is Retiring. Here’s Your Intuitive, Modern Alternative.

NCSC Web Check is Retiring. Here’s Your Intuitive, Modern Alternative.

The National Cyber Security Centre (NCSC) has confirmed that Web Check and Mail Check will be retired by March 2026. 
In the News
The Vulnerabulletin Issue #1

The Vulnerabulletin Issue #1

Introducing our new monthly newsletter, packed with research, industry news and Intruder updates.
Google Cloud Security: What’s Really On Your Shoulders

Google Cloud Security: What’s Really On Your Shoulders

Google Cloud secures its infrastructure, but customers are responsible for the rest. Discover common pitfalls and how to fix them with best practices.
Cloud security
EPSS vs. CVSS: What’s The Best Approach To Vulnerability Prioritization?

EPSS vs. CVSS: What’s The Best Approach To Vulnerability Prioritization?

Learn all about the Exploit Prediction Scoring System (EPSS), how it compares to CVSS and why it's a game changer for your vulnerability prioritization process.
Attack surface management
Azure Cloud Security: The Critical Vulnerabilities You’re Responsible For

Azure Cloud Security: The Critical Vulnerabilities You’re Responsible For

Avoid costly cloud mistakes. Learn which Azure vulnerabilities you’re responsible for - and how Intruder helps you fix them fast.
Cloud security
Say It, Secure It: Streamline Exposure Management with Claude + Intruder's MCP Server

Say It, Secure It: Streamline Exposure Management with Claude + Intruder's MCP Server

Learn how you can execute tasks and gather insights from Intruder with our new MCP server + Claude AI.
Product
Expanding Our Pricing Plans: A Design Story of Heroes, Villains, and “Gregomon”

Expanding Our Pricing Plans: A Design Story of Heroes, Villains, and “Gregomon”

From superheroes to neon villains, discover how our new pricing plan designs came to life through playful ideas, team feedback, and a love for visual storytelling.
Product
How To Catch People Using AI During Interviews

How To Catch People Using AI During Interviews

Get our top tips for reducing the impact of AI on interviews - including how to reduce your candidate pipeline, conduct facial symmetry analysis, and more.
Insights
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.