Bug Bounty & Agile Pentesting Platform

Guaranteeing cybersecurity is never child’s play, even for a large toy retailer

2020 saw four years of eCommerce growth in a single quarter, according to Colliers, as nearly 150 million people shopped online for the first time. That’s a staggering increase, and growth is predicted to continue at least through to the end of this decade. This rapid growth means eCommerce infrastructure is expanding rapidly too, bringing […]

Continue reading Continue reading

How ethical hackers can help to increase your attack surface visibility

200 years after the first design for a Panopticon, some security experts still dream of safeguarding the security of an entire institution from a single, centralized viewpoint. They are looking in the wrong direction. Cybersecurity teams who want to achieve comprehensive attack surface visibility should be looking to the future, not the past. Today, crowdsourced […]

Continue reading Continue reading

Vulnerability scanners vs bug bounty programs: What does your business need?

To compare vulnerability scanners vs bug bounty programs is, in many ways, to bring the long-standing debate about humans vs machines to the realm of cybersecurity. Automated tools, like security scanners, have been helping protect computers and networks for decades now. Recently, automation has progressed so rapidly that the battle of human vs machine might […]

Continue reading Continue reading

Port of Antwerp’s bug bounty program strengthens its world-class security defenses

“The most important result of working with Intigriti is that it offers you tangible and actionable results that significantly increase your security maturity.” – Yannick Herrebaut, CISO of Port of Antwerp About Port of Antwerp As Europe’s second-largest port, the Port of Antwerp is a major lifeline for the Belgian economy. The Port of Antwerp […]

Continue reading Continue reading

Attack surface management best practices: Intigriti’s top tips

While the cultural stereotype of a hacker sitting in front of a monochrome CRT tapping obscure terminal commands makes for interesting fiction, the damage real hackers do is far less entertaining. In this article, Intigriti discusses attack surface management best practices that help organizations stay one step ahead of malicious hackers. We’ll explain how using […]

Continue reading Continue reading

Visma’s “Mother of Hackers” speaks to Intigriti about running a successful virtual live hacking event 

Intigriti live hacking events involve bringing together a select team of security researchers, also known as ethical hackers, for a group bug bounty engagement. The invited researchers participate from across the globe, focusing on a particular target and set of assets. Hackers are chosen to take part in the event based on the skills and […]

Continue reading Continue reading

How Intigriti responded to the Log4j vulnerability

In this article, we’ll demonstrate how crowd security platforms give organizations additional support and assurance when a public zero-day vulnerability disclosure, such as Log4Shell (the Log4j vulnerability), happens. Last week, a zero-day vulnerability (Log4shell) was publicly disclosed in the widely-used Java-based logging library, Log4j.  As a leading ethical hacking and bug bounty platform, testing in […]

Continue reading Continue reading