Unlock the State of Pentesting 2023! Explore 3,100 pentests with expert insights on vulnerabilities, security challenges, & maximizing pentest value.

Cybersecurity Insights (2)

Back to Basics: How to Build Resilient Blue Teams

A comprehensive guide on how security teams can keep up with organizational change.
Feb 24, 2023
Est Read Time: 11 min

Business Pivots: How to Manage Risk When Your Org Changes Direction

As businesses navigate uncertainty, big operational shifts can completely change your risk profile. Here's how to adjust.
Feb 15, 2023
Est Read Time: 5 min

Pentests in Risk Assessments: When, Why, How

Find your vulnerabilities, determine the risk, and outline remediation — pentests can do all of this in support of your risk assessments.
Feb 14, 2023
Est Read Time: 3 min

Man-In-The-Middle Attacks: How to Detect and Prevent

This article covers the steps cybercriminals commonly take to execute different MITM attacks, and how security teams can detect and prevent them.
Jan 24, 2023
Est Read Time: 5 min

Cybersecurity Statistics for 2023

Every year in security we hear about more cyberattacks. With ransomware, zero-day exploits, data breaches, and such...
Dec 27, 2022
Est Read Time: 13 min

Dangers of Ransomware through File-Sharing Software

First appeared on Cybersecurity Magazine. Ransomware is an ever-growing threat to businesses and consumers alike....
Dec 13, 2022
Est Read Time: 3 min

Beginner Cybersecurity Tips

The holiday season brings about the traditional business of shopping for gifts, decorating, and traveling but it also...
Dec 9, 2022
Est Read Time: 3 min

Importance of Setting Security Goals in the Planning Process

Setting an end goal is important. As Frank Covey puts it, we should always aim to start with the end goal in mind....
Nov 22, 2022
Est Read Time: 3 min

PtaaS Roadshow Recap: Into the Hacker’s Mind

Cobalt Core members Vanessa Sauter, Derek Carlin, and Andreea Cristina Druga share insights on how to prepare for a pentest, what tools they use to stress test your assets, and the steps they take to check what vulnerabilities you’re susceptible to.
Nov 18, 2022
Est Read Time: 5 min
    1 2 3 4 5