WEBINAR
Learn how software development company Personio takes a strategic approach to pentesting.
WEBINAR
Learn how software development company Personio takes a strategic approach to pentesting.

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Introducing In-App Pentest Reports

My name is Kevin Bourne and I recently joined Cobalt as their new Customer Success Manager. My primary responsibility...
Mar 28, 2017
Est Read Time: 1 min

Crowdsourced Penetration Testing and PCI DSS Compliance

Various regulatory requirements that are lurking across different industries — involving different aspects of...
Mar 20, 2017
Est Read Time: 5 min

Pen Test Metrics 101: Detailed Definitions

This post is the second in a series I am writing about how to use pen test data in security metrics to analyze and...
Jan 9, 2017
Est Read Time: 6 min

Pen Test Metrics 101: Benefits and Types

This post is the first of a series in which I’ll cover how to use pen test data in security metrics to analyze and...
Dec 5, 2016
Est Read Time: 4 min

Integrating Crowdsourced Information Security into Agile SDLC

Keeping the balance between information security assurance and business goals has always presented itself as a big...
Nov 28, 2016
Est Read Time: 4 min

How to Write a Great Vulnerability Assessment Report with this Template

David Sopas shares his advice on writing a high-quality vulnerability assessment report.
Sep 28, 2016
Est Read Time: 7 min

The Benefits of Crowdsourced Pen Testing Illustrated through Tetris

In this blog post Claus Cramon Houmann uses the popular video game, Tetris, to illustrate the advantages of...
Sep 15, 2016
Est Read Time: 2 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.