WEBINAR
Join us to explore what 10 years of data tells us about real risks during the State of Pentesting 2025 webinar.
WEBINAR
Join us to explore what 10 years of data tells us about real risks during the State of Pentesting 2025 webinar.

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Enhancements to our Pentest as a Service platform empower agile development teams

Over the past two years, we’ve had the pleasure of hosting a Customer Advisory Board, where we bring together some of...
Mar 4, 2020
Est Read Time: 2 min

The Anatomy of Deserialization Attacks

What is Deserialization? Serialization is the process of turning some object into a data format that can be restored...
Jan 23, 2020
Est Read Time: 7 min

What traits do successful pentesters have in common?

We surveyed the Cobalt Core — our community of pentesters — to hear what they value most when working with other...
Jan 9, 2020
Est Read Time: 3 min

Understanding the Anatomy of an Attack

Notable, high-impact security breaches sadly make regular headlines. You might be tempted to dismiss the latest as just...
Nov 21, 2019
Est Read Time: 9 min

What a SaaS Provider Should Know about SOC 2 Compliance

For SaaS companies, data security is paramount. SOC 2 Type 1 and Type 2 audits are common voluntary undertakings that...
Nov 5, 2019
Est Read Time: 7 min

How to Scope a Network Penetration Test: Tips from an Expert Pentester

During a network pentest engagement, time is of the essence. A penetration tester has a fixed amount of time, typically...
Oct 3, 2019
Est Read Time: 4 min

Is Your Serverless App Secure?

In the past few months, I’ve hosted several sessions on serverless security for serverless developers and DevOps folks....
Aug 6, 2019
Est Read Time: 4 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.