PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications
PROMO
Limited Time: Get 40% Off a Comprehensive Pentest for AI and LLM Applications

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Crowdsourced Penetration Testing and PCI DSS Compliance

March 20, 2017
Est Read Time: 5 min
Various regulatory requirements that are lurking across different industries — involving different aspects of...
Compliance

The Third Wave of Application Security

January 26, 2017
Est Read Time: 8 min
Cybersecurity Insights

Pen Test Metrics 101: Detailed Definitions

January 9, 2017
Est Read Time: 6 min
This post is the second in a series I am writing about how to use pen test data in security metrics to analyze and...
Modernizing Pentesting

Pen Test Metrics 101: Benefits and Types

December 5, 2016
Est Read Time: 4 min
This post is the first of a series in which I’ll cover how to use pen test data in security metrics to analyze and...
Modernizing Pentesting

Integrating Crowdsourced Information Security into Agile SDLC

November 28, 2016
Est Read Time: 4 min
Keeping the balance between information security assurance and business goals has always presented itself as a big...
Cybersecurity Insights Agile Pentesting

How to Write a Great Vulnerability Assessment Report with this Template

September 28, 2016
Est Read Time: 7 min
David Sopas shares his advice on writing a high-quality vulnerability assessment report.
Pentester Guides

The Benefits of Crowdsourced Pen Testing Illustrated through Tetris

September 15, 2016
Est Read Time: 2 min
In this blog post Claus Cramon Houmann uses the popular video game, Tetris, to illustrate the advantages of...
Modernizing Pentesting

Bug Bounties on Bash on Ubuntu on Windows

July 19, 2016
Est Read Time: 4 min
Modernizing Pentesting

The Top 10 Vulnerabilities I used to reach #1 at Cobalt

July 13, 2016
Est Read Time: 4 min
Pentester Stories

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.