Try Now
Get hands on with Cobalt's PtaaS Platform

Jacob Fox

Jacob Fox is a search engine specialist at Cobalt. With a passion for technology, Jacob believes in the mission at Cobalt to transform traditional pentesting with the innovative Penetration Testing as a Service (PtaaS) platform focused on empowering companies to build out their pentesting programs.

Top 10 Hacking Movies of All Time

Movies about hackers boomed in popularity towards the end of the 21st century. Ranging from cult classics such as The...
Jun 8, 2022
Est Read Time: 1 min

Difference Between Security Incident and Breach

Reports of cyber attacks, online breaches, and hacks occur more and more frequently. With this disturbing trend on the...
Jun 3, 2022
Est Read Time: 1 min

Generating Actionable Pentest Results with PtaaS

Pentesting requires companies to do more than simply receive a report at the end of the test.
Dec 29, 2021
Est Read Time: 1 min

Top Holiday Gifts for Programmers, Coders, and Engineers

Looking for the next great gift to give a special computer wizard in your life? We’ve got you covered!
Dec 14, 2021
Est Read Time: 1 min

12 Days of PtaaS: 2021 Cobalt Product Recap

As another year passes, today we highlight many of the exciting product changes implemented for Cobalt’s Pentest as a...
Dec 6, 2021
Est Read Time: 1 min

How to Perform Azure Pentesting

Companies are benefiting from an increasing supply of cloud services. The ability to outsource features and functions...
Nov 17, 2021
Est Read Time: 1 min

What is Web Application Penetration Testing?

Web application pentesting is the best method of discovering flaws in web applications. Otherwise known as penetration...
Nov 2, 2021
Est Read Time: 1 min

From Commerce to eCommerce: How Retail Pentesting is Changing

Over the last decade, eCommerce has outpaced the growth of in-person shopping. eCommerce shopping accounted for 431...
Oct 29, 2021
Est Read Time: 1 min

How Pentesting Differs from Ethical Hacking

Pentesting and ethical hacking consist of two similar, but very different cybersecurity practices.
Aug 31, 2021
Est Read Time: 1 min
    1 2 3 4