Learn how Cobalt’s Pentest as a Service (PtaaS) model makes you faster, better, and more efficient.
Learn how Cobalt’s Pentest as a Service (PtaaS) model makes you faster, better, and more efficient.

The State of Pentesting 2023: How Operational Changes Can Jeopardize Security

The 2023 report taps into data from over 3,100 pentests we did in 2022, and 1,000 responses from security teams in the US, the UK, and Germany.

Casino Cyberattacks: A Wake-Up Call on the Threat of Vishing

As casinos and businesses in general increasingly rely on digital technology, they are becoming more vulnerable to...
Sep 22, 2023
Est Read Time: 4 min

The Crucial Role of Real-Time Communication in Pentests

While the technical aspects of pentesting are crucial, the importance of real-time communication between security teams...
Sep 20, 2023
Est Read Time: 2 min

Thinking Like an Attacker: Balancing Offensive and Defensive Cyber Tactics

In cybersecurity, strategies are broadly divided into two categories: offensive and defensive. While both approaches...
Sep 19, 2023
Est Read Time: 6 min

Offensive Security Maturity: How Offensive Security Strategies Evolve Based on Company Maturity

A business's success relies not only on its ability to innovate but also on its commitment to safeguarding its digital...
Sep 15, 2023
Est Read Time: 7 min

Introduction to Access Control Vulnerabilities

What is Access Control? Access Control plays a pivotal role in performing a penetration test.
Sep 14, 2023
Est Read Time: 8 min

Requirement to Change Pentest Vendors: Fact or Fiction?

There are a number of practices in the information security field that have traditionally been followed out of good...
Sep 13, 2023
Est Read Time: 3 min

Part 3: Learning iOS App Pentesting and Application Security with Real-World Case Studies

Welcome to part three of a blog series on iOS Application Security, where we delve into real-world case studies to...
Sep 5, 2023
Est Read Time: 7 min

The Evolution of Software Development from SDLC to SSDLC

Every piece of software, from mobile apps to intricate enterprise solutions, is developed using a structured process....
Aug 31, 2023
Est Read Time: 5 min

Understanding Data Security Compliance

Every digital interaction with customers or services relies on data. And there's a clear responsibility that comes with...
Aug 30, 2023
Est Read Time: 7 min
    1 2 3 4 5

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.