GET STARTED
Need to fast-track your pentesting? Our experts make it easy.
GET STARTED
Need to fast-track your pentesting? Our experts make it easy.

Modernizing Pentesting (9)

How to Choose a Pentest Service

Penetration testing or pentesting for short is a simulation of an attack on your company’s IT infrastructure or...
Mar 14, 2018
Est Read Time: 3 min

Pentest as a Service Lifecycle

The Pentest as a Service model combines data, technology, and talent to resolve security challenges for modern web...
Jan 9, 2018
Est Read Time: 4 min

Cost Metrics: Exploring Pentest as a Service Prices

(Editor’s Note: This blog post is based on a study conducted in 2017. A follow-up Pentest as a Service Impact Report,...
Dec 19, 2017
Est Read Time: 5 min

4 Tips to Successfully Kick Off a Pentest

My name is Kevin Bourne and I’m the Customer Success Manager at Cobalt. Over the past six months, I’ve kicked off +150...
Nov 7, 2017
Est Read Time: 3 min

3 Tips for Preparing for a Pentest

I’m the Chief Operations Officer at Cobalt, a Pen Testing as a Service company that has performed over 5800 pentests...
Oct 24, 2017
Est Read Time: 2 min

7 Steps to Building a Yearly Pentest Plan

Pentesting is a great way to check your security posture and is an essential part of an application security program....
Oct 17, 2017
Est Read Time: 4 min

Bypassing CSRF tokens with Python’s CGIHTTPServer to exploit SQL injections

There are ways to configure Burp using macros to bypass CSRF tokens on HTML forms, so we can use Burp Active Scans,...
Oct 11, 2017
Est Read Time: 4 min
    7 8 9 10 11