WEBINAR
Stop Pentesting like it’s 2006: 6 Modern Lessons from the GigaOm Radar
WEBINAR
Stop Pentesting like it’s 2006: 6 Modern Lessons from the GigaOm Radar

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

Navigating the Future of DevSecOps: A Deep Dive into the SANS 2023 Survey

October 4, 2023
Est Read Time: 4 min
As the tech industry continues to evolve at a rapid pace, organizations are striving to remain competitive and secure...
Cybersecurity Insights

How Layering Solutions Helps Create an Offensive Security Strategy

September 29, 2023
Est Read Time: 5 min
In today's digitized landscape, the question isn't if a security threat will arise but when. A holistic, multi-layered...
Cybersecurity Insights

Offensive Security within the Software Development Life Cycle (SDLC)

September 27, 2023
Est Read Time: 4 min
Integrating security measures within each stage of the Software Development Life Cycle (SDLC) helps organizations...
Cybersecurity Insights

Casino Cyberattacks: A Wake-Up Call on the Threat of Vishing

September 22, 2023
Est Read Time: 5 min
This content was co-authored by AI. Discover our editorial practices. As casinos and businesses in general increasingly...
Cybersecurity Insights Industry Breakdowns

The Crucial Role of Real-Time Communication in Pentests

September 20, 2023
Est Read Time: 2 min
While the technical aspects of pentesting are crucial, the importance of real-time communication between security teams...

Think Like an Attacker: Offensive Versus Defensive Cybersecurity

September 19, 2023
Est Read Time: 9 min
In cybersecurity, strategies are broadly divided into two categories: offensive and defensive. While both approaches...
Cybersecurity Insights

Offensive Security Maturity: How Offensive Security Strategies Evolve Based on Company Maturity

September 15, 2023
Est Read Time: 8 min
A business's success relies not only on its ability to innovate but also on its commitment to safeguarding its digital...
Cybersecurity Services

Requirement to Change Pentest Vendors: Fact or Fiction?

September 13, 2023
Est Read Time: 3 min
There are a number of practices in the information security field that have traditionally been followed out of good...
Modernizing Pentesting

Part 3: Learning iOS App Pentesting and Application Security with Real-World Case Studies

September 5, 2023
Est Read Time: 7 min
Welcome to part three of a blog series on iOS Application Security, where we delve into real-world case studies to...
Cobalt Core Mobile Application Pentesting

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.