WEBINAR
2026 Forecast: 5 New Trends, 3 Old Risks, & 1 Big Surprise
WEBINAR
2026 Forecast: 5 New Trends, 3 Old Risks, & 1 Big Surprise

Jacob Fox

Jacob Fox is a search engine optimization manager at Cobalt. He graduated from the University of Kansas with a Bachelor of Arts in Political Science. With a passion for technology, he believes in Cobalt's mission to transform traditional penetration testing with the innovative Pentesting as a Service (PTaaS) platform. He focuses on increasing Cobalt's marketing presence by helping craft positive user experiences on the Cobalt website.

Generating Actionable Pentest Results with PTaaS

December 29, 2021
Est Read Time: 3 min
Pentesting requires companies to do more than simply receive a report at the end of the test.
Modernizing Pentesting

Top Holiday Gifts for Programmers, Coders, and Engineers

December 14, 2021
Est Read Time: 4 min
Looking for the next great gift to give a special computer wizard in your life? We’ve got you covered!
Life at Cobalt

What is Web Application Penetration Testing?

November 2, 2021
Est Read Time: 3 min
Web application pentesting is the best method of discovering flaws in web applications. Otherwise known as penetration...
Modernizing Pentesting Web Application Pentesting

How Pentesting Differs from Ethical Hacking

August 31, 2021
Est Read Time: 3 min
Pentesting and ethical hacking consist of two similar, but very different cybersecurity practices.
Cybersecurity Insights

Average Cost of a Pentest

July 14, 2021
Est Read Time: 3 min
With so many cyber attacks occurring around the world, cybersecurity continues to grow in importance for companies....
Modernizing Pentesting

DevSecOps: A Modern Approach to Security

June 25, 2021
Est Read Time: 4 min
In the modern world, cybersecurity or lack thereof impacts almost every industry.
DevSecOps

What's Included in Pentest as a Service?

June 4, 2021
Est Read Time: 4 min
Pentest as a Service (PTaaS) brings together the human ingenuity of pentesting with the efficiency of a SaaS product.
Modernizing Pentesting

Mapping Cyberattacks to Maslow's Hierarchy of Needs

May 28, 2021
Est Read Time: 5 min
Maslow’s Hierarchy of Needs outlines the theory that human needs exist in a hierarchical structure. The hierarchy...
Cybersecurity Insights

How to Identify the Different Types of Malware

April 16, 2021
Est Read Time: 3 min
Cyberattacks continue to rise, with the level of sophistication of the attacks growing as businesses and organizations...
Cybersecurity Insights
    5 6 7 8 9