WHITEPAPER
The Offensive Security Blueprint: A Guide to Building a Modern, Strategic Program
WHITEPAPER
The Offensive Security Blueprint: A Guide to Building a Modern, Strategic Program

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Pentester Spotlight: Valerio Brussani

Valerio Brussani joined the Cobalt Core, our highly-experienced, geographically-diverse community of pentesters, in...
May 17, 2021
Est Read Time: 5 min

What is the Purpose of Pentesting?

The primary purpose of pentesting is to perceive your business through the eyes of an attacker and proactively thwart...
May 13, 2021
Est Read Time: 3 min

Cobalt Named to Inc. Magazine’s Annual List of Best Workplaces For 2021

I am thrilled to say that Cobalt has been named to Inc. magazine’s annual list of the Best Workplaces for 2021. The...
May 12, 2021
Est Read Time: 1 min

Pentester Diaries Ep4: Beyond Security Hygiene

Welcome back to Pentester Diaries, a podcast series that aims to take off the hacker hoodie and have a real...
May 12, 2021
Est Read Time: 15 min

Cobalt Platform Deep Dive: Scoping Pentests Based on Asset Size and Coverage

This blog post is part of an ongoing series in which members of the Cobalt product team provide deep dives into...
May 3, 2021
Est Read Time: 3 min

IaC Pipelines With Terraform And Cloud Build

“Today, most software exists, not to solve a problem, but to interface with other software.” — IO Angell In this blog...
May 2, 2021
Est Read Time: 8 min

Meet Engineering Halfway: How Pentest as a Service Speeds Up Remediation

Getting your pentests done is half the battle. Arguably the most important step is what comes after — fixing the...
Apr 28, 2021
Est Read Time: 3 min

Spotlight on Engineering: Tips From Our Hiring Team on How To Nail Our Interviews

We’ve said it before, we’ll say it again — Cobalt is scaling crazy fast! Over the next year our Engineering team is...
Apr 26, 2021
Est Read Time: 5 min

How to Maintain ISO 27001 Certification

Organizations need to cultivate a culture and Information Security Management Systems (ISMS) to allow compliance with...
Apr 23, 2021
Est Read Time: 4 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.