WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk
WEBINAR
Compliant vs. Secure: A CISO and CEO Discuss How to Manage Real-World Risk

Cybersecurity Insights (3)

What Is Baiting in Cybersecurity: Definition, Examples, and Mitigations

Baiting represents one of the oldest scams on the Internet, but it remains one of the most common because of its...
December 27, 2024
Est Read Time: 4 min

Top Cybersecurity Statistics for 2025

Our 2025 cybersecurity statistics show a continuation of trends we identified in our top cybersecurity statistics for...
December 23, 2024
Est Read Time: 14 min

Bitcoin vs Ethereum Smart Contracts: Security Comparisons

Bitcoin vs. Ethereum smart contracts: how do they compare from a security standpoint?
December 19, 2024
Est Read Time: 9 min

2024 Recap: Cobalt's Top AI and LLM Security Insights

As 2024 comes to a close, we’re taking a closer look at the year’s standout cybersecurity topics: AI and LLMs. These...
December 17, 2024
Est Read Time: 2 min

General Hospital Cybersecurity Requirements in NYC and New York State: Rules and Recommendations

On October 2, 2024, the New York State Register published new hospital cybersecurity requirements for all general...
December 6, 2024
Est Read Time: 5 min

Smart Contract Security Risks: Today's 10 Top Vulnerabilities and Mitigations

Smart contracts make it easier to execute digital agreements, but they can introduce security risks that compromise...
December 3, 2024
Est Read Time: 6 min

Overcoming Cybersecurity Challenges with Offensive Security Solutions

How do you do more with less in cybersecurity where you must constantly stay one step ahead of attackers? The easy...
October 30, 2024
Est Read Time: 4 min

Top 10 Pentesting Certifications to Promote Your Career

Penetration testing certifications provide credible third-party proof of your skills, opening the door to increased...
October 25, 2024
Est Read Time: 6 min

How Attackers Bypass Microsoft 365 MFA Checks: What Pentesters Need to Know

Vulnerabilities enable hackers to bypass Microsoft 365 multi-factor authentication checks. Bad actors can use various...
October 21, 2024
Est Read Time: 7 min
    1 2 3 4 5