Bug Bounty & Agile Pentesting Platform

Using bug bounty programs to tackle cryptocurrency security challenges 

With cryptocurrency becoming a more regular investment, holders must take steps to protect their investments. One organisation that helps crypto holders do this is Safe Haven through its digital inheritance solution, Inheriti.  In this blog post, Intigriti sits down with Safe Haven’s Chief Technology Officer (CTO) and CEO, Jürgen Schouppe, to discuss cryptocurrency security challenges, as well as […]

Continue reading Continue reading

Atos and Intigriti launch new integrated Bug Bounty service

Paris and Lille, France – September 9, 2021 – Atos and Intigriti, the European leading platform for bug bounty and ethical hacking, announce their collaboration to release an end-to-end bug bounty offering for organisations. Bug bounty consists of using expert researchers and ethical hackers, selected according to a precise protocol, to search for vulnerabilities in […]

Continue reading Continue reading

The Intigriti Leaderboard: What is it and how does it impact your program?

If you’re watching the Olympic Games, you’ll know that the leaderboard shows the top-performing countries based on the successes of their athletes. In the case of Intigriti’s Leaderboard, the athletes are an elite team of ethical hackers, and their arena is an ever-expanding attack surface that evolves at Darwinian-like speed. The competition? Hidden vulnerabilities embedded […]

Continue reading Continue reading

How The European Commission Helped Secure Open Source Software Communities

“Bug bounty platforms align very well with open source software because what you have is a community of ethical hackers helping another community. It is collaboration at the highest level.” – Miguel Díez Blanco, Project Lead Open Source Programme Office, at DIGIT – European Commission. About the European Commission’s Directorate General for Informatics (DG DIGIT)  The Directorate-General for Informatics (DIGIT) is the department responsible for […]

Continue reading Continue reading
Bug bounty history

A history of bug bounty programs & incentivised vulnerability disclosure

Hacker-powered security and bug bounty programs are growing concepts within the cybersecurity sector today. What you may not know is that ethical hacking, often dubbed as white-hat hacking, predates black-hat hacking activities. Throughout the sixties, hacking simply meant optimising systems and machines to make them run more efficiently.   Today, we’re going to circle back to the beginning of bug bounty programs to discover how […]

Continue reading Continue reading
Bug business feature image

Illustrating Hackers: Changing perceptions by changing how we see hackers

Anyone familiar with the Intigriti brand is likely to know that we illustrate our hackers. If you know our brand but not our quirky cartoons, a glance at our Ethical Hacker Insights Report or weekly hacker interviews will quickly bring you up to speed. In this blog post, we’re going to disclose why we illustrate our hackers, introduce a few members of our community, and hear about the creative process from the illustrator himself.   Why […]

Continue reading Continue reading

What Is An Ethical Hacker? And Why Do Companies Hire Them?

Ask someone to define the word ‘hacker’ and it’s almost guaranteed to spark a debate. Yet, hacking isn’t a new concept. In fact, it’s been around for decades. Throughout the sixties, hacking simply meant optimising systems and machines to make them run more efficiently.  Since then, the world’s fear and fascination with black hat hackers have clouded the term ‘hacker’, and as a result, many choose to differentiate between malicious […]

Continue reading Continue reading

Common Types Of Vulnerability Disclosure When Working With Ethical Hackers

Vulnerability disclosure refers to the method whereby an ethical hacker reports a security flaw or issue to a business. In this article, we explore the three most common types of vulnerability disclosure: Private disclosure, full disclosure and responsible disclosure. We also reveal how organisations can encourage researchers to follow the method that suits them best through a bug […]

Continue reading Continue reading