GUIDE
Secure Your Web Apps: Practical Fixes for the Top 5 Vulnerabilities.
GUIDE
Secure Your Web Apps: Practical Fixes for the Top 5 Vulnerabilities.

Cybersecurity Insights (9)

Importance of Setting Security Goals in the Planning Process

Setting an end goal is important. As Frank Covey puts it, we should always aim to start with the end goal in mind....
Nov 22, 2022
Est Read Time: 3 min

PtaaS Roadshow Recap: Into the Hacker’s Mind

Cobalt Core members Vanessa Sauter, Derek Carlin, and Andreea Cristina Druga share insights on how to prepare for a pentest, what tools they use to stress test your assets, and the steps they take to check what vulnerabilities you’re susceptible to.
Nov 18, 2022
Est Read Time: 5 min

Cybersecurity for Startups: Setting a Budget

Starting a company is hard, very hard.
Nov 1, 2022
Est Read Time: 6 min

CIA Triad Importance in Compliance Certification

The CIA triad represents foundational principles within the discipline of cybersecurity. The term is an acronym with...
Oct 27, 2022
Est Read Time: 5 min

Down to Business: Drive Growth and Innovation with New Security Tactics

Let’s face it, whether you’re a seasoned infosec veteran or someone who just googled how to get SOC 2 certified, this...
Sep 19, 2022
Est Read Time: 3 min

How Low Severity Vulns Become Critical: PACMAN Attack Example

Your latest pentest report was just delivered and there are a dozen findings with severity scores ranging from...
Aug 30, 2022
Est Read Time: 3 min

What Is a Bot?

A bot, short for robot, is an autonomous program that performs automatic repetitive tasks or mimics the actions of a...
Aug 23, 2022
Est Read Time: 6 min

Why Scalable Security Teams Make SO MUCH SENSE for Startups

Cobalt partner Eden Data explores a new way startups can tackle security without braking the bank.
Aug 8, 2022
Est Read Time: 5 min

Meet Judy: The Security AI Watching Out for Small and Midsize Businesses

Compliance mapping, ongoing security training, endpoint detection and response, password management, and 24/7 monitoring — if you pictured a whole team of security consultants while reading this, you’ve clearly not met Judy.
Jul 29, 2022
Est Read Time: 4 min