GUIDE
Secure Your Web Apps: Practical Fixes for the Top 5 Vulnerabilities.
GUIDE
Secure Your Web Apps: Practical Fixes for the Top 5 Vulnerabilities.

A CISO's View of AI and Supply Chain Risks

As a CISO, I’m increasingly concerned about the new wave of cyber risks—particularly the vulnerabilities lurking in...

Web Cache Deception: What It Is and How to Test for It?

This blog covers web cache deception, a vulnerability that occurs when caching systems mistakenly store and serve...
Aug 29, 2025
Est Read Time: 13 min

Top Cybersecurity Podcasts in 2025

Staying ahead in cybersecurity means more than just reading the latest threat reports—it’s about hearing directly from...
Aug 29, 2025
Est Read Time: 3 min

The Enduring Wisdom of a Fifty-Cent Comb: Why Your Pentest's Price Tag Matters

Childhood memories often have a funny way of teaching us life's most important lessons, especially when it comes to the...
Aug 26, 2025
Est Read Time: 5 min

A CEO’s Warning for Corporate America: The Clock Is Ticking  on CISA Expiration

Every modern business runs on a digital foundation, and we (corporate leaders and board members) invest heavily in...
Aug 25, 2025
Est Read Time: 3 min

The difference between AI Security and Securing AI

Every industry is dealing with the new reality that AI agents and large language models (LLMs) can do things faster...
Aug 12, 2025
Est Read Time: 4 min

The Hidden Advantage: Why Experienced Pentesters Hold the Keys to a More Secure Future

Many in the cybersecurity world still grapple with understanding the dynamics of zero-day vulnerabilities and why...
Aug 5, 2025
Est Read Time: 4 min

Wake Up Call: The One Big Beautiful Bill Act's Hidden Meaning for Securing the Supply Chain

Think of the global economy less like a series of independent fortresses and more like a single, globe-spanning power...
Aug 1, 2025
Est Read Time: 4 min

A CISO's View of AI and Supply Chain Risks

As a CISO, I’m increasingly concerned about the new wave of cyber risks—particularly the vulnerabilities lurking in...
Jul 31, 2025
Est Read Time: 4 min

Thinking Like Attackers Do: Insights From SANS on Offensive Security

Ever feel like you’re playing a perpetual game of defense? I was reading a new SANS white paper, Adopting an Offensive...
Jul 24, 2025
Est Read Time: 2 min
    1 2 3 4 5

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.