Bug Bounty & Agile Pentesting Platform

The Hacking Policy Council has launched, with Intigriti a founding member

Intigriti becomes founding member and sole EU representative for the Hacking Policy Council

ANTWERP, BELGIUM. APRIL 13, 2023 – Intigriti, a leading cybersecurity platform, is proud to announce its participation as the sole EU representative and founding member of the newly-launched Hacking Policy Council. Alongside organizations including Google, Intel, and Luta Security, this DC-based think tank aims to create a favorable legal, policy, and business environment for ethical […]

Continue reading Continue reading

Cybersecurity and sustainability: The surprising role that security will play in a sustainable future

The links between cybersecurity and sustainability go much deeper than you think.  When thinking about crowdsourced security, the first topic that comes to mind probably isn’t sustainability. From a business perspective, there are, of course, huge benefits of having robust cybersecurity, particularly when it comes to ensuring the sustainability and longevity of your company. But the […]

Continue reading Continue reading

10  security tips to help keep you safe online in 2023 

It’s time for your annual cyber-health check  With cyber-attacks and data breaches showing no sign of slowing, now’s the perfect time for your annual cyber-health check.  Here are 10 cybersecurity tips to help you to ring in the new year:   Security-conscious readers should already be using two-factor authentication (2FA; also known as multifactor authentication, or […]

Continue reading Continue reading

Top cybersecurity trends for 2023

We look ahead to some key cybersecurity trends for next year.  Importance of remote working security measures  While the pandemic may seem like a thing of the past, many of its effects are here to stay. This includes working from home and hybrid working. The idea of people keeping their laptops and other work devices at home may […]

Continue reading Continue reading

Bug bounty and AI: How machine learning is changing the game for cybersecurity

AI presents some fresh opportunities to the bug bounty industry, but caveats apply You would be hard-pressed to find anyone in the cybersecurity industry who had not heard of ChatGPT over the past few weeks. Launched by research lab OpenAI as a prototype in November, ChatGPT is an artificial intelligence (AI) chatbot that quickly garnered […]

Continue reading Continue reading

Penetration testing challenges 

How best can businesses navigate the common penetration testing challenges that arise when improving their security posture? In one of our last blogs, we discussed how Pentesting as a Service updated the pentesting format. As a rendition of Software as a Service, this change led pentesting to be more cost efficient, scalable and ultimately more […]

Continue reading Continue reading

Attack surface management best practices: Intigriti’s top tips

While the cultural stereotype of a hacker sitting in front of a monochrome CRT tapping obscure terminal commands makes for interesting fiction, the damage real hackers do is far less entertaining. In this article, Intigriti discusses attack surface management best practices that help organizations stay one step ahead of malicious hackers. We’ll explain how using […]

Continue reading Continue reading

The new OWASP Top 10 for 2021

OWASP top 10; Over the last 4 years, the cybersecurity field has continued to see incredible leaps forward at an unimaginable pace. As attacks that used to be prevalent 15 years ago are slowly dying out, new attack vectors are being discovered day in and day out. Security researchers and bug bounty hunters alike often […]

Continue reading Continue reading

A history of bug bounty programs & incentivised vulnerability disclosure

Hacker-powered security and bug bounty programs are growing concepts within the cybersecurity sector today. What you may not know is that ethical hacking, often dubbed as white-hat hacking, predates black-hat hacking activities. Throughout the sixties, hacking simply meant optimising systems and machines to make them run more efficiently.   Today, we’re going to circle back to the beginning of bug bounty programs to discover how […]

Continue reading Continue reading

Common Types Of Vulnerability Disclosure When Working With Ethical Hackers

Vulnerability disclosure refers to the method whereby an ethical hacker reports a security flaw or issue to a business. In this article, we explore the three most common types of vulnerability disclosure: Private disclosure, full disclosure and responsible disclosure. We also reveal how organisations can encourage researchers to follow the method that suits them best through a bug […]

Continue reading Continue reading