WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk
WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Empowering Security and Compliance: How Cobalt and Vanta’s Integration Streamlines Vulnerability Management

In today's rapidly evolving tech landscape, security and compliance are non-negotiable for growing companies. As...
November 13, 2024
Est Read Time: 2 min

Pentester Spotlight: Hristu Gelegram

The Cobalt Pentester Spotlight highlights the fascinating journey of our Core members. Through an interview style, we...
November 5, 2024
Est Read Time: 4 min

European Cyber Resilience Act Overview: What Companies Need to Know

The European Council adopted the European Cyber Resilience Act (CRA) on October 10, 2024, initiating the countdown to...
November 1, 2024
Est Read Time: 6 min

Back to the Future with Cloud Penetration Testing

Understanding the evolution of cloud penetration testing is crucial for maintaining robust cybersecurity. The shift...
October 31, 2024
Est Read Time: 5 min

Overcoming Cybersecurity Challenges with Offensive Security Solutions

How do you do more with less in cybersecurity where you must constantly stay one step ahead of attackers? The easy...
October 30, 2024
Est Read Time: 4 min

Beyond the Perimeter: Exploring the Modern Attack Surface

Attack surface analysis is critical in securing your infrastructure and providing insight into potential ways intruders...
October 28, 2024
Est Read Time: 3 min

Top 10 Pentesting Certifications to Promote Your Career

Penetration testing certifications provide credible third-party proof of your skills, opening the door to increased...
October 25, 2024
Est Read Time: 6 min

Looking Back on Our 2024 Azores CAB

This year's Customer Advisory Board (CAB) meeting was nothing short of extraordinary. Set in the breathtaking Azores,...
October 24, 2024
Est Read Time: 2 min

How Attackers Bypass Microsoft 365 MFA Checks: What Pentesters Need to Know

Vulnerabilities enable hackers to bypass Microsoft 365 multi-factor authentication checks. Bad actors can use various...
October 21, 2024
Est Read Time: 7 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.