NEW FEATURE
Cobalt PtaaS + DAST combines manual pentests and automated scanning for comprehensive applications security.
NEW FEATURE
Cobalt PtaaS + DAST combines manual pentests and automated scanning for comprehensive applications security.

Jacob Fox

Jacob Fox is a search engine optimization manager at Cobalt. He graduated from the University of Kansas with a Bachelor of Arts in Political Science. With a passion for technology, he believes in Cobalt's mission to transform traditional penetration testing with the innovative Pentesting as a Service (PtaaS) platform. He focuses on increasing Cobalt's marketing presence by helping craft positive user experiences on the Cobalt website.

National Cybersecurity Awareness Month: Top 10 Cybersecurity Threats of the Last Two Decades

Two decades ago, the U.S. Department of Homeland Security, the National Cyber Security Alliance, and the Cybersecurity...
Oct 5, 2023
Est Read Time: 6 min

Navigating the Future of DevSecOps: A Deep Dive into the SANS 2023 Survey

As the tech industry continues to evolve at a rapid pace, organizations are striving to remain competitive and secure...
Oct 4, 2023
Est Read Time: 4 min

How Layering Solutions Helps Create an Offensive Security Strategy

In today's digitized landscape, the question isn't if a security threat will arise but when. A holistic, multi-layered...
Sep 29, 2023
Est Read Time: 5 min

Offensive Security within the Software Development Life Cycle (SDLC)

Integrating security measures within each stage of the Software Development Life Cycle (SDLC) helps organizations...
Sep 27, 2023
Est Read Time: 4 min

Casino Cyberattacks: A Wake-Up Call on the Threat of Vishing

This content was co-authored by AI. Discover our editorial practices. As casinos and businesses in general increasingly...
Sep 22, 2023
Est Read Time: 5 min

Thinking Like an Attacker: Balancing Offensive and Defensive Cyber Tactics

In cybersecurity, strategies are broadly divided into two categories: offensive and defensive. While both approaches...
Sep 19, 2023
Est Read Time: 6 min

Offensive Security Maturity: How Offensive Security Strategies Evolve Based on Company Maturity

A business's success relies not only on its ability to innovate but also on its commitment to safeguarding its digital...
Sep 15, 2023
Est Read Time: 7 min

The Evolution of Software Development from SDLC to SSDLC

Every piece of software, from mobile apps to intricate enterprise solutions, is developed using a structured process....
Aug 31, 2023
Est Read Time: 5 min

Understanding Data Security Compliance

Every digital interaction with customers or services relies on data. And there's a clear responsibility that comes with...
Aug 30, 2023
Est Read Time: 7 min
    1 2 3 4 5