PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications
PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

On-Demand, Streamlined, Interactive: SANS Reviews Our Pentest as a Service Platform

April 6, 2021
Est Read Time: 2 min
Traditional pentesting still raises numerous operational challenges for agile and fast-paced companies. We surveyed 165...
Modernizing Pentesting

CISOs Assemble: Shaping a Security Strategy

April 5, 2021
Est Read Time: 4 min
Cybersecurity Insights

Pentester Diaries Ep2: 2FA Bypass Techniques

April 1, 2021
Est Read Time: 17 min
Welcome back to Pentester Diaries, a podcast series that aims to take off the hacker hoodie and have a real...
Pentester Stories Cobalt Core

Understanding the CVSS Base Score: An Essential Guide

April 1, 2021
Est Read Time: 5 min
A company is only as secure as its software. Any time a business introduces new technology into operations, sensitive...
Cybersecurity Insights

What is Cybersecurity Maturity Model Certification (CMMC)?

March 25, 2021
Est Read Time: 4 min
Addressing cyber threats in any organization remains critical. Threats such as ransomware, phishing, and Trojans have...
Compliance

Cobalt Platform Deep Dive: Pentest Coverage Checklist

March 23, 2021
Est Read Time: 2 min
This blog post is part of an ongoing series in which members of the Cobalt product team provide deep dives into...
Product Updates DevSecOps

Cobalt’s Pentest Maturity Model: Which Level Are You?

March 23, 2021
Est Read Time: 3 min
The modern business world constantly faces digital threats. With companies facing these continuous threats,...
Cybersecurity Insights

Spotlight on Engineering: A Sneak Peek Into Cobalt's Engineering Teams

March 22, 2021
Est Read Time: 2 min
Over the past 7 years, Cobalt has evolved from a four-man startup into a provider of a leading Pentest as a Service...
Life at Cobalt

Anatomy of the Session Management Tests

March 19, 2021
Est Read Time: 6 min
Note: This article has been created in light of the OWASP standards and descriptions.
Cobalt Core Pentester Guides

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.