NEW FEATURE
Cobalt PtaaS + DAST combines manual pentests and automated scanning for comprehensive applications security.
NEW FEATURE
Cobalt PtaaS + DAST combines manual pentests and automated scanning for comprehensive applications security.

Cybersecurity Insights (6)

Kids Say the Darndest Things Cybersecurity Edition

In our modern world, teaching kids about cybersecurity should be on any parent’s radar to ensure eSafety in this...
Oct 4, 2022
Est Read Time: 2 min

Application Security Should Be a Badge of Honor, Not a Wall of Shame

Imagine a future where the security of a web application was as openly available as the SSL certificate.
Oct 3, 2022
Est Read Time: 3 min

Down to Business: Drive Growth and Innovation with New Security Tactics

Let’s face it, whether you’re a seasoned infosec veteran or someone who just googled how to get SOC 2 certified, this...
Sep 19, 2022
Est Read Time: 3 min

How Low Severity Vulns Become Critical: PACMAN Attack Example

Your latest pentest report was just delivered and there are a dozen findings with severity scores ranging from...
Aug 30, 2022
Est Read Time: 3 min

What Is a Bot?

A bot, short for robot, is an autonomous program that performs automatic repetitive tasks or mimics the actions of a...
Aug 23, 2022
Est Read Time: 5 min

17 Upcoming Cybersecurity Events 2022

Cybersecurity requires synergy across many different people, processes, and technology. To achieve a strong security...
Aug 15, 2022
Est Read Time: 7 min

Why Scalable Security Teams Make SO MUCH SENSE for Startups

Cobalt partner Eden Data explores a new way startups can tackle security without braking the bank.
Aug 8, 2022
Est Read Time: 5 min

Meet Judy: The Security AI Watching Out for Small and Midsize Businesses

Compliance mapping, ongoing security training, endpoint detection and response, password management, and 24/7 monitoring — if you pictured a whole team of security consultants while reading this, you’ve clearly not met Judy.
Jul 29, 2022
Est Read Time: 4 min

What is Threat Modeling?

Senior Security Consultant Gisela Hinojosa walks us through the STRIDE framework and her threat modeling process.
Jul 22, 2022
Est Read Time: 4 min
    4 5 6 7 8