Intigriti

Bug Bounty & Agile Pentesting Platform

Visma’s Bug Bounty Program Manager speaks to Intigriti about the practice of running a successful program

Visma is a leading provider of cloud software solutions in Europe and Latin America. With around one million public and private sector customers for their software solutions across the Nordics, Benelux, Central and Eastern Europe, and Latin America, the organization works continuously to maintain a robust security posture. In this interview, we speak to one […]

Continue reading Continue reading

Meet two hackers heading to Yahoo’s live hacking event, 1337UP0822 

Intigriti’s live hacking events offer a completely different experience to conventional bug bounty hunting. They work by inviting ethical hackers (also known as security researchers and, in this case, bug bounty hunters) to collaborate and connect with a specific organization’s security team, fellow hackers, and of course, Intigriti! Hackers are invited to participate based on […]

Continue reading Continue reading

How to prepare your internal team for launching a bug bounty program

Bug bounty programs are an excellent way for organizations to find and resolve cybersecurity vulnerabilities. However, to maximize success, it’s important to include this essential pre-step: the need to prepare internal teams when launching a bug bounty program launch. To help guide you through the process, this article covers all the steps in getting your […]

Continue reading Continue reading

Security is a continuous process. Here’s why your testing process should be too

“Continuous security testing” has recently achieved a top ten spot in the cybersecurity lexicon. At first glance, it appears self-explanatory and very sensible—something like, “An apple a day keeps the doctor away”, right? Well, yes. But what exactly is continuous security testing? How is it different from other cybersecurity approaches, such as penetration tests (pen […]

Continue reading Continue reading

What is a bug bounty platform? And what are the alternatives? 

Organizations run bug bounty programs as a way to identify and fix vulnerabilities within their systems, assets, and applications. They work by giving ethical hackers permission to test for vulnerabilities and provide a report of what they discover in an effort to reduce their attack surface. Alternative security testing methods include penetration tests and vulnerability […]

Continue reading Continue reading

Lighten up; Dark Theme is here! 

Dark theme is a popular request for every application, website, or operating system (OS) nowadays. There are many reasons for that; some are merely preferences in style, and others are accessibility and health concerns (I think most of us have gotten a headache from staring at overly bright screens for too long at some point!) […]

Continue reading Continue reading

Enhanced Reporting Experience

In this release, we focused on improving your reporting experience. A quick typo or a cluttered code block is a thing of the past with code syntax highlighting and a native spell check everywhere! New changes to your reporting experience in a nutshell: Wowowow, did I just see coloured code blocks on submissions? 👀 Researcher Bandjes […]

Continue reading Continue reading