WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

Anatomy of Authentication Tests

March 5, 2020
Est Read Time: 4 min
Introduction Authentication, as OWASP states, is the process of verifying that an individual, entity, or website is who...
Vulnerabilities

Enhancements to our Pentest as a Service platform empower agile development teams

March 4, 2020
Est Read Time: 2 min
Over the past two years, we’ve had the pleasure of hosting a Customer Advisory Board, where we bring together some of...
Product Updates Agile Pentesting

What is Threat Intelligence and How Does it Relate to Pentesting?

February 23, 2020
Est Read Time: 4 min
Modernizing Pentesting

The Anatomy of Deserialization Attacks

January 23, 2020
Est Read Time: 7 min
What is Deserialization? Serialization is the process of turning some object into a data format that can be restored...
Vulnerabilities

What traits do successful pentesters have in common?

January 9, 2020
Est Read Time: 3 min
We surveyed the Cobalt Core — our community of pentesters — to hear what they value most when working with other...
Cobalt Core

Understanding the Anatomy of an Attack

November 21, 2019
Est Read Time: 9 min
Notable, high-impact security breaches sadly make regular headlines. You might be tempted to dismiss the latest as just...
Vulnerabilities

What it means to be a part of the Cobalt Core

October 8, 2019
Est Read Time: 2 min
Cobalt Core

How to Scope a Network Penetration Test: Tips from an Expert Pentester

October 3, 2019
Est Read Time: 4 min
During a network pentest engagement, time is of the essence. A penetration tester has a fixed amount of time, typically...
Vulnerabilities

Is Your Serverless App Secure?

August 6, 2019
Est Read Time: 4 min
In the past few months, I’ve hosted several sessions on serverless security for serverless developers and DevOps folks....
Vulnerabilities

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.