WEBINAR
Learn how software development company Personio takes a strategic approach to pentesting.
WEBINAR
Learn how software development company Personio takes a strategic approach to pentesting.

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Understanding the Anatomy of an Attack

Notable, high-impact security breaches sadly make regular headlines. You might be tempted to dismiss the latest as just...
Nov 21, 2019
Est Read Time: 9 min

What a SaaS Provider Should Know about SOC 2 Compliance

For SaaS companies, data security is paramount. SOC 2 Type 1 and Type 2 audits are common voluntary undertakings that...
Nov 5, 2019
Est Read Time: 7 min

How to Scope a Network Penetration Test: Tips from an Expert Pentester

During a network pentest engagement, time is of the essence. A penetration tester has a fixed amount of time, typically...
Oct 3, 2019
Est Read Time: 4 min

Is Your Serverless App Secure?

In the past few months, I’ve hosted several sessions on serverless security for serverless developers and DevOps folks....
Aug 6, 2019
Est Read Time: 4 min

From Pen Test to Pentest

The English language evolves and changes over time and new words are created. In many cases, simply combining the...
Jul 8, 2019
Est Read Time: 2 min

Cobalt.io is CREST Pentest Certified

Cobalt is excited to announce that we are officially a “CREST Penetration Testing Service” Provider.
May 7, 2019
Est Read Time: 2 min

Cobalt's PtaaS Platform has a powerful new feature: Assets

We are excited to introduce — Assets.
Apr 29, 2019
Est Read Time: 1 min

Nurturing the Security Mindset

Many organizations seek to embed security and technical risk management into their development culture, making security...
Apr 11, 2019
Est Read Time: 8 min

How customer collaboration during a pentest can lead to finding a Remote Code Execution (RCE)

I was asked to share a blog post about a Remote Code Execution vulnerability that I identified in a past pentest....
Apr 9, 2019
Est Read Time: 2 min

From SSRF to Port Scanner

How to convert a SSRF vulnerability into a Port Scanner
Mar 18, 2019
Est Read Time: 4 min

A Manager’s Guide to Selecting the Best Testing Approach for Your Application Security Needs

Security testing has emerged as a common best practice among application security programs of all types and sizes. The...
Mar 14, 2019
Est Read Time: 9 min

3 things you should be doing when you pentest an Android application

To perform a pentest on an android application there are three important things that should be done by the pentester.
Jan 18, 2019
Est Read Time: 2 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.