WEBINAR
Learn how software development company Personio takes a strategic approach to pentesting.
WEBINAR
Learn how software development company Personio takes a strategic approach to pentesting.

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Cut Through the Noise: The Value of Secure Code Reviews

With the expansion of the attack surface, a backlog of entries for the NVD, and the reliance on software to do pretty...
Aug 1, 2024
Est Read Time: 5 min

6 New Cybersecurity Regulations to Prepare for in 2024

New cybersecurity regulations going into effect in 2024 place unprecedented compliance demands on organizations. Some...
Jul 30, 2024
Est Read Time: 13 min

The 6 Layers of Offensive Security Testing (and Why They Matter)

The security of our online assets has never been more critical.
Jul 26, 2024
Est Read Time: 9 min

Understanding Your Digital Risk Profile: Introduction to Pretexting

The 2024 Verizon Data Breach Investigations Report highlights a significant trend in the realm of cybersecurity...
Jul 19, 2024
Est Read Time: 7 min

How Digital Risk Assessments Can Protect Your Business from the RockYou2024 Password Leak

On July 4th, 2024, a hacker posted a file named "rockyou2024.txt" on a popular hacking forum, containing 9.9 billion...
Jul 15, 2024
Est Read Time: 2 min

How Pentesting Reduces Costs of Cybersecurity Insurance

Cybersecurity insurance, also known as cyber liability insurance, protects businesses from financial losses resulting...
Jul 3, 2024
Est Read Time: 7 min

Top 10 API Security Validation Techniques

Through the use of APIs and applications, the business world is becoming a more interconnected place every day. This...
Jun 28, 2024
Est Read Time: 7 min

What is Cloud Penetration Testing? How PtaaS Increases Network Resilience

Cloud penetration testing can be the most effective way to increase your network's resilience.
Jun 26, 2024
Est Read Time: 6 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.