GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!
GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Pen Test Metrics 101: Detailed Definitions

This post is the second in a series I am writing about how to use pen test data in security metrics to analyze and...
Jan 9, 2017
Est Read Time: 6 min

Pen Test Metrics 101: Benefits and Types

This post is the first of a series in which I’ll cover how to use pen test data in security metrics to analyze and...
Dec 5, 2016
Est Read Time: 4 min

Integrating Crowdsourced Information Security into Agile SDLC

Keeping the balance between information security assurance and business goals has always presented itself as a big...
Nov 28, 2016
Est Read Time: 4 min

CISO Mind Map

While trolling the internet we stumbled upon a super cool mind map! We liked it so much that we decided to add a little...
Nov 16, 2016
Est Read Time: 1 min

How to Write a Great Vulnerability Assessment Report with this Template

David Sopas shares his advice on writing a high-quality vulnerability assessment report.
Sep 28, 2016
Est Read Time: 7 min

The Benefits of Crowdsourced Pen Testing Illustrated through Tetris

In this blog post Claus Cramon Houmann uses the popular video game, Tetris, to illustrate the advantages of...
Sep 15, 2016
Est Read Time: 2 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.