Learn how Cobalt’s Pentest as a Service (PtaaS) model makes you faster, better, and more efficient.
Learn how Cobalt’s Pentest as a Service (PtaaS) model makes you faster, better, and more efficient.

The State of Pentesting 2023: How Operational Changes Can Jeopardize Security

The 2023 report taps into data from over 3,100 pentests we did in 2022, and 1,000 responses from security teams in the US, the UK, and Germany.

Navigating the Future of DevSecOps: A Deep Dive into the SANS 2023 Survey

As the tech industry continues to evolve at a rapid pace, organizations are striving to remain competitive and secure...
Oct 4, 2023
Est Read Time: 4 min

How Layering Solutions Helps Create an Offensive Security Strategy

In today's digitized landscape, the question isn't if a security threat will arise but when. A holistic, multi-layered...
Sep 29, 2023
Est Read Time: 5 min

Offensive Security within the Software Development Life Cycle (SDLC)

Integrating security measures within each stage of the Software Development Life Cycle (SDLC) helps organizations...
Sep 27, 2023
Est Read Time: 4 min

Casino Cyberattacks: A Wake-Up Call on the Threat of Vishing

As casinos and businesses in general increasingly rely on digital technology, they are becoming more vulnerable to...
Sep 22, 2023
Est Read Time: 5 min

The Crucial Role of Real-Time Communication in Pentests

While the technical aspects of pentesting are crucial, the importance of real-time communication between security teams...
Sep 20, 2023
Est Read Time: 2 min

Thinking Like an Attacker: Balancing Offensive and Defensive Cyber Tactics

In cybersecurity, strategies are broadly divided into two categories: offensive and defensive. While both approaches...
Sep 19, 2023
Est Read Time: 6 min

Offensive Security Maturity: How Offensive Security Strategies Evolve Based on Company Maturity

A business's success relies not only on its ability to innovate but also on its commitment to safeguarding its digital...
Sep 15, 2023
Est Read Time: 7 min

Introduction to Access Control Vulnerabilities

What is Access Control? Access Control plays a pivotal role in performing a penetration test.
Sep 14, 2023
Est Read Time: 8 min

Requirement to Change Pentest Vendors: Fact or Fiction?

There are a number of practices in the information security field that have traditionally been followed out of good...
Sep 13, 2023
Est Read Time: 3 min
    1 2 3 4 5

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.