WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Blogs

Thoughts, perspectives, and industry commentary from the Cobalt team.

Penetration Testing for SaaS Companies

May 8, 2017
Est Read Time: 3 min
SaaS companies have fundamentally transformed the enterprise software model and at this point it seems there is no...
Modernizing Pentesting

Start at Zero with the OWASP Top 10

April 24, 2017
Est Read Time: 3 min
Engineering is an exercise in working within constraints. Appsec increases those constraints, forcing developers to...
Cybersecurity Insights

Introducing In-App Pentest Reports

March 28, 2017
Est Read Time: 1 min
My name is Kevin Bourne and I recently joined Cobalt as their new Customer Success Manager. My primary responsibility...
Product Updates

The Third Wave of Application Security

January 26, 2017
Est Read Time: 8 min
Cybersecurity Insights

Pen Test Metrics 101: Detailed Definitions

January 9, 2017
Est Read Time: 6 min
This post is the second in a series I am writing about how to use pen test data in security metrics to analyze and...
Modernizing Pentesting

Pen Test Metrics 101: Benefits and Types

December 5, 2016
Est Read Time: 4 min
This post is the first of a series in which I’ll cover how to use pen test data in security metrics to analyze and...
Modernizing Pentesting

Integrating Crowdsourced Information Security into Agile SDLC

November 28, 2016
Est Read Time: 4 min
Keeping the balance between information security assurance and business goals has always presented itself as a big...
Cybersecurity Insights Agile Pentesting

How to Write a Great Vulnerability Assessment Report with this Template

September 28, 2016
Est Read Time: 7 min
David Sopas shares his advice on writing a high-quality vulnerability assessment report.
Vulnerabilities

The Benefits of Crowdsourced Pen Testing Illustrated through Tetris

September 15, 2016
Est Read Time: 2 min
In this blog post Claus Cramon Houmann uses the popular video game, Tetris, to illustrate the advantages of...
Modernizing Pentesting

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.