GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!
GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Security Love Languages: 7 Tips to Win Friends and Influence People in Security

As humans, we express our love for others through words and actions, and we receive love by interpreting the words and actions of others.
Mar 18, 2020
Est Read Time: 4 min

How To Strengthen the Relationship Between Security and Engineering

Historically, there has been a disconnect between security and engineering teams.
Mar 15, 2020
Est Read Time: 3 min

Anatomy of Authentication Tests

Introduction Authentication, as OWASP states, is the process of verifying that an individual, entity, or website is who...
Mar 5, 2020
Est Read Time: 4 min

Enhancements to our Pentest as a Service platform empower agile development teams

Over the past two years, we’ve had the pleasure of hosting a Customer Advisory Board, where we bring together some of...
Mar 4, 2020
Est Read Time: 2 min

The Anatomy of Deserialization Attacks

What is Deserialization? Serialization is the process of turning some object into a data format that can be restored...
Jan 23, 2020
Est Read Time: 7 min

What traits do successful pentesters have in common?

We surveyed the Cobalt Core — our community of pentesters — to hear what they value most when working with other...
Jan 9, 2020
Est Read Time: 3 min

Understanding the Anatomy of an Attack

Notable, high-impact security breaches sadly make regular headlines. You might be tempted to dismiss the latest as just...
Nov 21, 2019
Est Read Time: 9 min

What a SaaS Provider Should Know about SOC 2 Compliance

For SaaS companies, data security is paramount. SOC 2 Type 1 and Type 2 audits are common voluntary undertakings that...
Nov 5, 2019
Est Read Time: 7 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.