GUIDE
Secure Your Web Apps: Practical Fixes for the Top 5 Vulnerabilities.
GUIDE
Secure Your Web Apps: Practical Fixes for the Top 5 Vulnerabilities.

Jacob Fox

Jacob Fox is a search engine optimization manager at Cobalt. He graduated from the University of Kansas with a Bachelor of Arts in Political Science. With a passion for technology, he believes in Cobalt's mission to transform traditional penetration testing with the innovative Pentesting as a Service (PtaaS) platform. He focuses on increasing Cobalt's marketing presence by helping craft positive user experiences on the Cobalt website.

Difference Between Security Incident and Breach

Reports of cyber attacks, online breaches, and hacks occur more and more frequently. With this disturbing trend on the...
Jun 3, 2022
Est Read Time: 2 min

Generating Actionable Pentest Results with PtaaS

Pentesting requires companies to do more than simply receive a report at the end of the test.
Dec 29, 2021
Est Read Time: 3 min

Top Holiday Gifts for Programmers, Coders, and Engineers

Looking for the next great gift to give a special computer wizard in your life? We’ve got you covered!
Dec 14, 2021
Est Read Time: 4 min

What is Web Application Penetration Testing?

Web application pentesting is the best method of discovering flaws in web applications. Otherwise known as penetration...
Nov 2, 2021
Est Read Time: 3 min

How Pentesting Differs from Ethical Hacking

Pentesting and ethical hacking consist of two similar, but very different cybersecurity practices.
Aug 31, 2021
Est Read Time: 3 min

Average Cost of a Pentest

With so many cyber attacks occurring around the world, cybersecurity continues to grow in importance for companies....
Jul 14, 2021
Est Read Time: 3 min

DevSecOps: A Modern Approach to Security

In the modern world, cybersecurity or lack thereof impacts almost every industry.
Jun 25, 2021
Est Read Time: 4 min

What's Included in Pentest as a Service?

Pentest as a Service (PtaaS) brings together the human ingenuity of pentesting with the efficiency of a SaaS product.
Jun 4, 2021
Est Read Time: 4 min

Mapping Cyberattacks to Maslow's Hierarchy of Needs

Maslow’s Hierarchy of Needs outlines the theory that human needs exist in a hierarchical structure. The hierarchy...
May 28, 2021
Est Read Time: 5 min
    5 6 7 8 9