WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk
WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Cobalt Named in Inc. 5000 for the Fourth Year in a Row

We are excited to announce that Inc. Magazine has released its annual list of America's fastest-growing private...
August 15, 2024
Est Read Time: 1 min

Lessons Learned from the MGM Breach

The recent arrest of a teenager linked to last year's MGM cyberattack is a stark reminder that no organization,...
August 5, 2024
Est Read Time: 4 min

Cut Through the Noise: The Value of Secure Code Reviews

With the expansion of the attack surface, a backlog of entries for the NVD, and the reliance on software to do pretty...
August 1, 2024
Est Read Time: 5 min

6 New Cybersecurity Regulations to Prepare for in 2024

New cybersecurity regulations going into effect in 2024 place unprecedented compliance demands on organizations. Some...
July 30, 2024
Est Read Time: 13 min

The 6 Layers of Offensive Security Testing (and Why They Matter)

The security of our online assets has never been more critical.
July 26, 2024
Est Read Time: 9 min

Understanding Your Digital Risk Profile: Introduction to Pretexting

The 2024 Verizon Data Breach Investigations Report highlights a significant trend in the realm of cybersecurity...
July 19, 2024
Est Read Time: 7 min

How Digital Risk Assessments Can Protect Your Business from the RockYou2024 Password Leak

On July 4th, 2024, a hacker posted a file named "rockyou2024.txt" on a popular hacking forum, containing 9.9 billion...
July 15, 2024
Est Read Time: 2 min

How Pentesting Reduces Costs of Cybersecurity Insurance

Cybersecurity insurance, also known as cyber liability insurance, protects businesses from financial losses resulting...
July 3, 2024
Est Read Time: 7 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.