WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk
WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk

Jacob Fox

Jacob Fox is a search engine optimization manager at Cobalt. He graduated from the University of Kansas with a Bachelor of Arts in Political Science. With a passion for technology, he believes in Cobalt's mission to transform traditional penetration testing with the innovative Pentesting as a Service (PTaaS) platform. He focuses on increasing Cobalt's marketing presence by helping craft positive user experiences on the Cobalt website.

The Evolution of Software Development from SDLC to SSDLC

Every piece of software, from mobile apps to intricate enterprise solutions, is developed using a structured process....
August 31, 2023
Est Read Time: 5 min

Understanding Data Security Compliance

Every digital interaction with customers or services relies on data. And there's a clear responsibility that comes with...
August 30, 2023
Est Read Time: 7 min

Security is Everyone's Business: What is Good Security Culture?

The pandemic accelerated the digital transformation of businesses worldwide. Suddenly, departments that traditionally...
August 29, 2023
Est Read Time: 5 min

What is Continuous Security Testing and Why Is It Important?

In Spring Valley, Illinois, St. Margaret’s Health achieved a somber distinction in 2023 when it became the first known...
August 22, 2023
Est Read Time: 7 min

Top SDLC Frameworks: From Waterfall to DevOps, Incorporating Security Testing

Every software project starts with an idea. Yet, transforming this idea into a working product isn't only about writing...
August 18, 2023
Est Read Time: 8 min

Fortifying Our Future: U.S. Government Introduces the Latest Hacking Challenge at DefCon 2023

This content was co-authored by AI. Discover our editorial practices. Are you a security professional looking to...
August 10, 2023
Est Read Time: 3 min

Rise of the Machines: 8 Dangerous AI Hacking Tools

As hackers become more sophisticated and technology rapidly advances, the threat of data breaches and malicious attacks...
August 9, 2023
Est Read Time: 7 min

Top 10 Most Notorious Hacker Groups in History

Hacker groups exploit weaknesses in software and systems. They're clandestine collectives whose size can range from a...
July 31, 2023
Est Read Time: 8 min

TOITOIN Campaign Impacting Bank Cybersecurity

This content was co-authored by AI. Discover our editorial practices. In the world of banking, cybersecurity is always...
July 25, 2023
Est Read Time: 5 min
    2 3 4 5 6