WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting
WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Anatomy of Authentication Tests

Introduction Authentication, as OWASP states, is the process of verifying that an individual, entity, or website is who...
Mar 5, 2020
Est Read Time: 4 min

Enhancements to our Pentest as a Service platform empower agile development teams

Over the past two years, we’ve had the pleasure of hosting a Customer Advisory Board, where we bring together some of...
Mar 4, 2020
Est Read Time: 2 min

The Anatomy of Deserialization Attacks

What is Deserialization? Serialization is the process of turning some object into a data format that can be restored...
Jan 23, 2020
Est Read Time: 7 min

What traits do successful pentesters have in common?

We surveyed the Cobalt Core — our community of pentesters — to hear what they value most when working with other...
Jan 9, 2020
Est Read Time: 3 min

Understanding the Anatomy of an Attack

Notable, high-impact security breaches sadly make regular headlines. You might be tempted to dismiss the latest as just...
Nov 21, 2019
Est Read Time: 9 min

What a SaaS Provider Should Know about SOC 2 Compliance

For SaaS companies, data security is paramount. SOC 2 Type 1 and Type 2 audits are common voluntary undertakings that...
Nov 5, 2019
Est Read Time: 7 min

How to Scope a Network Penetration Test: Tips from an Expert Pentester

During a network pentest engagement, time is of the essence. A penetration tester has a fixed amount of time, typically...
Oct 3, 2019
Est Read Time: 4 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.