GUIDE
Secure Your Web Apps: Practical Fixes for the Top 5 Vulnerabilities.
GUIDE
Secure Your Web Apps: Practical Fixes for the Top 5 Vulnerabilities.

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Enhancements to our Pentest as a Service platform empower agile development teams

Over the past two years, we’ve had the pleasure of hosting a Customer Advisory Board, where we bring together some of...
Mar 4, 2020
Est Read Time: 2 min

The Anatomy of Deserialization Attacks

What is Deserialization? Serialization is the process of turning some object into a data format that can be restored...
Jan 23, 2020
Est Read Time: 7 min

What traits do successful pentesters have in common?

We surveyed the Cobalt Core — our community of pentesters — to hear what they value most when working with other...
Jan 9, 2020
Est Read Time: 3 min

Understanding the Anatomy of an Attack

Notable, high-impact security breaches sadly make regular headlines. You might be tempted to dismiss the latest as just...
Nov 21, 2019
Est Read Time: 9 min

What a SaaS Provider Should Know about SOC 2 Compliance

For SaaS companies, data security is paramount. SOC 2 Type 1 and Type 2 audits are common voluntary undertakings that...
Nov 5, 2019
Est Read Time: 7 min

How to Scope a Network Penetration Test: Tips from an Expert Pentester

During a network pentest engagement, time is of the essence. A penetration tester has a fixed amount of time, typically...
Oct 3, 2019
Est Read Time: 4 min

Is Your Serverless App Secure?

In the past few months, I’ve hosted several sessions on serverless security for serverless developers and DevOps folks....
Aug 6, 2019
Est Read Time: 4 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.