WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk
WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk

Cybersecurity Insights (13)

What Is Sensitive Data?

With large amounts of data processed each day by IT systems and networks, it’s imperative that organizations know how...
November 22, 2021
Est Read Time: 3 min

Winning the Security Budget Fight With Tips From Security Executives

Are you preparing for next year's security budget? Budget negotiations can be pivotal in guaranteeing the right...
October 27, 2021
Est Read Time: 4 min

Terraform, The Less-Common Commands And Options

This post was originally published on cloudlad.io
September 14, 2021
Est Read Time: 5 min

Pentesting for the Merger & Acquisition Sector: Cybersecurity Due Diligence

Mergers and acquisitions (M&A) are a main driver of growth for many organizations, with the main objective of...
September 13, 2021
Est Read Time: 4 min

How Pentesting Differs from Ethical Hacking

Pentesting and ethical hacking consist of two similar, but very different cybersecurity practices.
August 31, 2021
Est Read Time: 3 min

Cobalt API: Import Your Findings to Google Sheets

Make sure to check out our Integrations page for more info! Last week we announced the launch of the Cobalt API—a...
June 6, 2021
Est Read Time: 8 min

Mapping Cyberattacks to Maslow's Hierarchy of Needs

Maslow’s Hierarchy of Needs outlines the theory that human needs exist in a hierarchical structure. The hierarchy...
May 28, 2021
Est Read Time: 5 min

IaC Pipelines With Terraform And Cloud Build

“Today, most software exists, not to solve a problem, but to interface with other software.” — IO Angell In this blog...
May 2, 2021
Est Read Time: 8 min

How to Identify the Different Types of Malware

Cyberattacks continue to rise, with the level of sophistication of the attacks growing as businesses and organizations...
April 16, 2021
Est Read Time: 3 min