Try Now
Get hands on with Cobalt's PtaaS Platform

Cybersecurity Insights (5)

How Pentesting Differs from Ethical Hacking

Pentesting and ethical hacking consist of two similar, but very different cybersecurity practices.
Aug 31, 2021
Est Read Time: 1 min

Enterprise DevSecOps: Types Of Testing

‘The ‘Sec’ in DevSecOps can be the Robin to your DevOps Batman — a trusty sidekick providing continuous backup.” -...
Aug 18, 2021
Est Read Time: 1 min

Faster, Smarter, Stronger: Get on Track for Cybersecurity Success with SecTalks 2021

Running a marathon is a long-term commitment — just like continuously protecting your business from cyberattacks.
Aug 13, 2021
Est Read Time: 1 min

Timeline of Recent Cyber Breaches

“Until you have experienced something like this, you don’t realize just what can happen, just how serious it can be.” —...
Aug 10, 2021
Est Read Time: 4 min

Engineer Perspective: Benefits of Cobalt's PtaaS platform

With the most important aspect of a pentest coming after the test itself, via remediation, Engineering and Security...
Jul 2, 2021
Est Read Time: 1 min

Mapping Cyberattacks to Maslow's Hierarchy of Needs

Maslow’s Hierarchy of Needs outlines the theory that human needs exist in a hierarchical structure. The hierarchy...
May 28, 2021
Est Read Time: 1 min

IaC Pipelines With Terraform And Cloud Build

“Today, most software exists, not to solve a problem, but to interface with other software.” — IO Angell In this blog...
May 2, 2021
Est Read Time: 10 min

How to Identify the Different Types of Malware

Cyberattacks continue to rise, with the level of sophistication of the attacks growing as businesses and organizations...
Apr 16, 2021
Est Read Time: 1 min
    3 4 5 6 7