Blog

Read our latest news, research & expert advice on cyber security

More from us

Clear all filters
Expanding Our Pricing Plans: A Design Story of Heroes, Villains, and “Gregomon”
Product

Expanding Our Pricing Plans: A Design Story of Heroes, Villains, and “Gregomon”

Nika Vizintin Prinz
April 9, 2025
min read
From superheroes to neon villains, discover how our new pricing plan designs came to life through playful ideas, team feedback, and a love for visual storytelling.
How To Catch People Using AI During Interviews
Insights

How To Catch People Using AI During Interviews

Will
April 1, 2025
min read
Get our top tips for reducing the impact of AI on interviews - including how to reduce your candidate pipeline, conduct facial symmetry analysis, and more.
Moving Vulnerability Management from Chaos to Confidence (Key Takeaways)
Vulnerability management

Moving Vulnerability Management from Chaos to Confidence (Key Takeaways)

Camilla Perselli
March 12, 2025
min read
Key takeaways from our recent vulnerability management roundtable: how to engage leadership, prioritize real risk, and move from chaos to confidence.
AWS Security Services: What They Do and Don’t Do
Cloud security

AWS Security Services: What They Do and Don’t Do

Courtney De Winter
March 6, 2025
min read
AWS security services help protect your cloud, but they don’t secure everything. See what’s missing and how Intruder goes further to simplify cloud security.
Private Bug Bounty: Finding The Needle In The Haystack
Vulnerabilities and Threats

Private Bug Bounty: Finding The Needle In The Haystack

Daniel Andrew
February 5, 2025
min read
Discover how our security team uncovered complex vulnerabilities that required human expertise to detect - helping our customers stay ahead of emerging threats.
What Is Attack Surface Management?
Attack surface management

What Is Attack Surface Management?

Chris Wallis
December 12, 2024
min read
Learn all about attack surface management, understand why attack surfaces are growing, and discover how to monitor and manage them effectively with Intruder.
No results found
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.