DAST
Continuously monitor web applications for vulnerabilities at scale with Cobalt Dynamic Application Security Testing (DAST).
DAST
Continuously monitor web applications for vulnerabilities at scale with Cobalt Dynamic Application Security Testing (DAST).

Modernizing Pentesting

Common Network Security Vulnerabilities

Understanding network vulnerabilities is a critical aspect of cybersecurity. This knowledge is not just about...
Dec 6, 2023
Est Read Time: 6 min

Requirement to Change Pentest Vendors: Fact or Fiction?

There are a number of practices in the information security field that have traditionally been followed out of good...
Sep 13, 2023
Est Read Time: 3 min

The Role of Threat Modeling in Penetration Testing

This article was originally published on Cybersecurity Magazine.
Jul 20, 2023
Est Read Time: 6 min

A Comprehensive Guide to AWS Pentesting

Take a closer look at what AWS pentesting is and how you can perform a pentest on AWS.
Jun 29, 2023
Est Read Time: 6 min

What is Continuous Pentesting?

Learn more about how a continuous pentesting program with Agile Pentesting helps improve your security posture.
Jun 23, 2023
Est Read Time: 3 min

Pentest Checklist: Preparing for a Penetration Test

Preparing for a penetration test can be stressful to say the least.
Jun 14, 2023
Est Read Time: 4 min

How To Create and Scale a Penetration Testing Policy

Penetration testing involves simulating the behavior of a threat actor to assess the resilience of an organization’s...
May 4, 2023
Est Read Time: 4 min

Pentesting Containers: Overview & Security Best Practices

Containers are packages that provide operating system (OS) Level Virtualization. They deliver software or an...
Apr 28, 2023
Est Read Time: 4 min

Manual Versus Automated Penetration Testing

Penetration testing or pentesting is the process of finding vulnerabilities in a company's systems by simulating a...
Apr 26, 2023
Est Read Time: 9 min
    1 2 3 4 5