Bug Bounty & Agile Pentesting Platform

HR software giant Personio takes its bug bounty program to the next level

Arnau Estebanell, senior application security engineer at Personio, discusses the important role bug bounties can play in the security of SaaS businesses. Personio is a European tech company that develops software to simplify HR management processes. Following a successful invite-only bug bounty that launched last year with Intigriti, the company has taken the next step […]

Continue reading Continue reading

Nurturing program engagement: Easy steps you can take to keep your bug bounty program ticking 

 How to optimize your bug bounty program for long-term success.   Bug bounty programs often have a whirlwind start. In those first few weeks, the submissions can come thick and fast. SecOps and development teams are kept busy fixing important issues. Stakeholders begin to relax as their investment becomes justified. Sound familiar?  This is often the […]

Continue reading Continue reading

Bug Bytes #193 – Top 10 Web Hacking Techniques for 2022, Confessions of the Community and Filter Evasion

Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by InsiderPhD. Every week, she keeps us up to date with a comprehensive list of write-ups, tools, tutorials and resources. This issue covers the weeks from February 13th to February 19th Intigriti News From my notebook […]

Continue reading Continue reading

Safe harbor legal framework for ethical hacker officially launches in Belgium 

As part of the Belgian Act on the Protection of Whistleblowers, dispositions were adopted to offer a safe harbor for ethical hackers who respect certain strict conditions.  Some positive developments impacting Belgium’s cybersecurity industry came into effect today (February 15), with newly adopted legal dispositions serving to protect ethical hackers and bug bounty hunters.  Much like […]

Continue reading Continue reading

Hybrid Pentesting: The Smart Approach to Securing your Assets

Pentesting-as-a-Service is your next crucial layer of security For businesses dedicated to their security, they’ll know that truly mature infrastructure doesn’t involve just one kind of protection. Vulnerability scanners, firewalls, periodic penetration tests, and bug bounties are all independent layers of an onion of well-rounded cybersecurity. They each serve different purposes and ensure every kind […]

Continue reading Continue reading