WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

From Pen Test to Pentest

July 8, 2019
Est Read Time: 2 min
The English language evolves and changes over time and new words are created. In many cases, simply combining the...
Modernizing Pentesting

What a Pentester Learned Becoming Google Cloud Architect Certified

June 2, 2019
Est Read Time: 2 min
Photo by Samuel Zeller on Unsplash
Cobalt Core Cloud Security

Cobalt.io is CREST Pentest Certified

May 7, 2019
Est Read Time: 2 min
Cobalt is excited to announce that we are officially a “CREST Penetration Testing Service” Provider.
NEWS

Cobalt's PtaaS Platform has a powerful new feature: Assets

April 29, 2019
Est Read Time: 1 min
We are excited to introduce — Assets.
Product Updates

Nurturing the Security Mindset

April 11, 2019
Est Read Time: 8 min
Many organizations seek to embed security and technical risk management into their development culture, making security...
Cybersecurity Insights

How customer collaboration during a pentest can lead to finding a Remote Code Execution (RCE)

April 9, 2019
Est Read Time: 2 min
I was asked to share a blog post about a Remote Code Execution vulnerability that I identified in a past pentest....
Cobalt Core Vulnerabilities

From SSRF to Port Scanner

March 18, 2019
Est Read Time: 4 min
How to convert a SSRF vulnerability into a Port Scanner
Vulnerabilities

A Manager’s Guide to Selecting the Best Testing Approach for Your Application Security Needs

March 14, 2019
Est Read Time: 9 min
Security testing has emerged as a common best practice among application security programs of all types and sizes. The...
Cybersecurity Insights

3 things you should be doing when you pentest an Android application

January 18, 2019
Est Read Time: 2 min
To perform a pentest on an android application there are three important things that should be done by the pentester.
Cybersecurity Insights Mobile Application Pentesting

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.