WEBINAR
Join us to explore what 10 years of data tells us about real risks during the State of Pentesting 2025 webinar.
WEBINAR
Join us to explore what 10 years of data tells us about real risks during the State of Pentesting 2025 webinar.

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Integrating Crowdsourced Information Security into Agile SDLC

Keeping the balance between information security assurance and business goals has always presented itself as a big...
Nov 28, 2016
Est Read Time: 4 min

How to Write a Great Vulnerability Assessment Report with this Template

David Sopas shares his advice on writing a high-quality vulnerability assessment report.
Sep 28, 2016
Est Read Time: 7 min

The Benefits of Crowdsourced Pen Testing Illustrated through Tetris

In this blog post Claus Cramon Houmann uses the popular video game, Tetris, to illustrate the advantages of...
Sep 15, 2016
Est Read Time: 2 min

ImageTragick

There have been many high profile vulnerabilities discovered the last years. One of the most interesting...
May 31, 2016
Est Read Time: 5 min

Deconstructing and Rewiring Bug Bounty Programs

On the surface, public bug bounty programs look like a no-brainer. You invite a number of security researchers to find...
Mar 24, 2016
Est Read Time: 5 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.