The cloud isn't secure by default: what containers changed about risk

The cloud isn't secure by default: what containers changed about risk

Containers made it easier to ship fast — and easier to ship risk. Intruder's VP of Product breaks down where container risk comes from across the full security lifecycle, and what
Overconfident and under resourced: navigating the midmarket security gap

Overconfident and under resourced: navigating the midmarket security gap

Too complex for SMB tools, too lean for enterprise stacks - midmarket security teams are stuck in the middle. New research reveals how bad the gap really is.
Registry vs. runtime: where to scan your container images

Registry vs. runtime: where to scan your container images

Container image scanning should happen at the registry level, not at runtime inside clusters. Centralized registry scanning gives teams full visibility, reduces operational overhea
Why attack surface reduction is your first line of defense

Why attack surface reduction is your first line of defense

Proactive attack surface reduction is about reducing unnecessary internet exposure before it becomes a problem.
The Vulnerabulletin Issue #5

The Vulnerabulletin Issue #5

Issue 5 of our monthly newsletter, packed with research, industry news and Intruder updates.
The Vulnerabulletin Issue #4

The Vulnerabulletin Issue #4

Issue 4 of our monthly newsletter, packed with research, industry news and Intruder updates.
Beyond Compliance: What Actually Builds Customer Trust

Beyond Compliance: What Actually Builds Customer Trust

Compliance frameworks help you pass an audit; continuous compliance helps you keep customer confidence.
See TODAY’S CVE TRENDS
Clear all filters
Single page applications: Why do you need to scan them?

Single page applications: Why do you need to scan them?

Learn about single page applications, how they are different to mulit-page applications, why it's important to scan them for vulnerabilities, and how we scan them.
Application security
Guides
Metrics matter: why we've added analytics to show your progress

Metrics matter: why we've added analytics to show your progress

See your progress over time with a suite of new analytics in your Intruder dashboard.
Product
Cybersecurity Compliance: How to Become Compliant in 6 Steps

Cybersecurity Compliance: How to Become Compliant in 6 Steps

Robust cybersecurity is more than best practice, it’s often a regulatory requirement. Here’s everything you need to know about the major compliance requirements.
Compliance
ISO 27001 compliance: your essential guide

ISO 27001 compliance: your essential guide

Find out all you need to know about achieving ISO 27001 compliance and how vulnerability management can help with our essential guide.
Compliance
Celebrating the best of Intruder from 2023

Celebrating the best of Intruder from 2023

Faster scanning. Improved time to fix. Lots of new features. Check out our biggest highlights from 2023.
Product
Introducing Nuclei: the scanner that packs a punch

Introducing Nuclei: the scanner that packs a punch

Find out about Nuclei, the benefits of using multiple scanning engines, and how this helps reduce your attack surface.
Product
Vulnerability scanning
Attack surface management vs vulnerability management

Attack surface management vs vulnerability management

With so many solutions on the market, it’s important to understand the differences between attack surface management and vulnerability management.
Attack surface management
Vulnerability management
11 Best Asset Discovery Tools For 2026

11 Best Asset Discovery Tools For 2026

Asset discovery is the first step in managing your attack surface. Find out our top asset discovery tool recommendations.
Attack surface management
9 best DevSecOps tools for 2026

9 best DevSecOps tools for 2026

DevSecOps tools help identify security vulnerabilities early in your development process. Explore our list of the best tools for 2025.
DevOps Security
Guides
DevSecOps best practices: how to secure your pipeline

DevSecOps best practices: how to secure your pipeline

Many DevOps advantages actually create security challenges. Find out how to help secure your dev pipeline with Intruder.
DevOps Security
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.