WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk
WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk

Gisela Hinojosa

Gisela Hinojosa is a Senior Security Consultant at Cobalt with over 5 years of experience as a penetration tester. Gisela performs a wide range of penetration tests including, network, web application, mobile application, Internet of Things (IoT), red teaming, phishing and threat modeling with STRIDE. Gisela currently holds the Security+, GMOB, GPEN and GPWAT certifications.

AI in Cybersecurity: How Hackers and Security Teams Use Artificial Intelligence

AI in cybersecurity presents IT teams with formidable new challenges while providing powerful, innovative cybersecurity...
May 16, 2025
Est Read Time: 8 min

New HIPAA Regulations for 2025: Security Updates You Need to Know

Until now, Health Insurance Portability and Accountability Act (HIPAA) security regulations have permitted...
April 11, 2025
Est Read Time: 6 min

Speak the Language of Security: 20 Essential Hacking Terminologies

Knowing hacking terminologies forms a foundation for effective cybersecurity by making it easier to research security...
February 27, 2025
Est Read Time: 8 min

Top 6 API Pentesting Tools

API pentesting tools have become critical for cybersecurity. APIs play a crucial role in the finance, retail, and...
February 11, 2025
Est Read Time: 5 min

LLM System Prompt Leakage: Prevention Strategies

LLM system prompt leakage represents an important addition to the Open Worldwide Application Security Project (OWASP)...
February 3, 2025
Est Read Time: 5 min

Less Findings in your Pentest? Measuring the Effectiveness of a Penetration Test

Have you been doing pentesting for a while and getting fewer and fewer findings or fewer high-severity findings? Is it...
January 6, 2025
Est Read Time: 6 min

What Is Baiting in Cybersecurity: Definition, Examples, and Mitigations

Baiting represents one of the oldest scams on the Internet, but it remains one of the most common because of its...
December 27, 2024
Est Read Time: 4 min

Beyond the Perimeter: Exploring the Modern Attack Surface

Attack surface analysis is critical in securing your infrastructure and providing insight into potential ways intruders...
October 28, 2024
Est Read Time: 3 min

A Pentester Guide to LDAP Bind Method Vulnerabilities

Lightweight Directory Access Protocol (LDAP) provides a convenient standard for distributed directory service...
October 9, 2024
Est Read Time: 6 min