Introducing container image scanning: no agents, no blind spots

Introducing container image scanning: no agents, no blind spots

Agentless container image scanning. Automatically discover and continuously scan your container images across AWS, Azure, and Google Cloud. No agents, no blind spots.
The cloud isn't secure by default: what containers changed about risk

The cloud isn't secure by default: what containers changed about risk

Containers made it easier to ship fast — and easier to ship risk. Intruder's VP of Product breaks down where container risk comes from across the full security lifecycle, and what
Overconfident and under resourced: navigating the midmarket security gap

Overconfident and under resourced: navigating the midmarket security gap

Too complex for SMB tools, too lean for enterprise stacks - midmarket security teams are stuck in the middle. New research reveals how bad the gap really is.
Registry vs. runtime: where to scan your container images

Registry vs. runtime: where to scan your container images

Container image scanning should happen at the registry level, not at runtime inside clusters. Centralized registry scanning gives teams full visibility, reduces operational overhea
The Vulnerabulletin Issue #5

The Vulnerabulletin Issue #5

Issue 5 of our monthly newsletter, packed with research, industry news and Intruder updates.
The Vulnerabulletin Issue #4

The Vulnerabulletin Issue #4

Issue 4 of our monthly newsletter, packed with research, industry news and Intruder updates.
Beyond Compliance: What Actually Builds Customer Trust

Beyond Compliance: What Actually Builds Customer Trust

Compliance frameworks help you pass an audit; continuous compliance helps you keep customer confidence.
See TODAY’S CVE TRENDS
Clear all filters
The Vulnerabulletin Issue #1

The Vulnerabulletin Issue #1

Introducing our new monthly newsletter, packed with research, industry news and Intruder updates.
In the News
Insights
Product
Google Cloud Security: What’s Really On Your Shoulders

Google Cloud Security: What’s Really On Your Shoulders

Google Cloud secures its infrastructure, but customers are responsible for the rest. Discover common pitfalls and how to fix them with best practices.
Cloud security
Guides
EPSS vs. CVSS: What’s The Best Approach To Vulnerability Prioritization?

EPSS vs. CVSS: What’s The Best Approach To Vulnerability Prioritization?

Learn all about the Exploit Prediction Scoring System (EPSS), how it compares to CVSS and why it's a game changer for your vulnerability prioritization process.
Attack surface management
Vulnerability management
Guides
Azure Cloud Security: The Critical Vulnerabilities You’re Responsible For

Azure Cloud Security: The Critical Vulnerabilities You’re Responsible For

Avoid costly cloud mistakes. Learn which Azure vulnerabilities you’re responsible for - and how Intruder helps you fix them fast.
Cloud security
Guides
Say It, Secure It: Streamline Exposure Management with Claude + Intruder's MCP Server

Say It, Secure It: Streamline Exposure Management with Claude + Intruder's MCP Server

Learn how you can execute tasks and gather insights from Intruder with our new MCP server + Claude AI.
Product
Expanding Our Pricing Plans: A Design Story of Heroes, Villains, and “Gregomon”

Expanding Our Pricing Plans: A Design Story of Heroes, Villains, and “Gregomon”

From superheroes to neon villains, discover how our new pricing plan designs came to life through playful ideas, team feedback, and a love for visual storytelling.
Product
How To Catch People Using AI During Interviews

How To Catch People Using AI During Interviews

Get our top tips for reducing the impact of AI on interviews - including how to reduce your candidate pipeline, conduct facial symmetry analysis, and more.
Guides
AWS Cloud Security Explained: What’s Left Exposed?

AWS Cloud Security Explained: What’s Left Exposed?

Think AWS has your security covered? Not entirely. This blog breaks down what AWS doesn’t secure, real-world risks you’re responsible for, and key actions you can take.
Cloud security
Guides
Moving Vulnerability Management from Chaos to Confidence (Key Takeaways)

Moving Vulnerability Management from Chaos to Confidence (Key Takeaways)

Key takeaways from our recent vulnerability management roundtable: how to engage leadership, prioritize real risk, and move from chaos to confidence.
Vulnerability management
AWS Security Services: What They Do and Don’t Do

AWS Security Services: What They Do and Don’t Do

AWS security services help protect your cloud, but they don’t secure everything. See what’s missing and how Intruder goes further to simplify cloud security.
Cloud security
Guides
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.