WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting
WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

Pentesting vs Bug Bounty: Which is Better for Your Company's Security?

Penetration testing (pentesting) and bug bounty programs (bug bounties) are a common part of companies' cybersecurity...
Sep 18, 2024
Est Read Time: 7 min

LLM Supply Chain Attack: Prevention Strategies

LLM supply chain attack vulnerabilities have emerged as a top risk for machine learning models. Third-party training...
Sep 16, 2024
Est Read Time: 6 min

SANS AI Survey: Key Takeaways and Future Strategies for Cybersecurity Teams

Earlier today, SANS launched their 2024 study AI and Its Growing Role in Cybersecurity: Lessons Learned and Path...
Sep 11, 2024
Est Read Time: 4 min

What is an Attack Vector? Defending against 23 Common Attack Vectors

Attack vector management forms the foundation for effective cybersecurity. Understanding the attack vectors that...
Sep 9, 2024
Est Read Time: 14 min

10 Questions with Aditya Raj Singh: Pentester Spotlight

The Cobalt Pentester Spotlight highlights the fascinating journey of our Core members. Through an interview style, we...
Sep 5, 2024
Est Read Time: 4 min

Updates to SEC Cybersecurity Requirements

Last July, the Securities and Exchange Commission adopted new cybersecurity rules placing disclosure requirements on...
Sep 5, 2024
Est Read Time: 5 min

NIST Releases First Post-Quantum Encryption Standards

The National Institute of Standards and Technology (NIST) has released the first finalized standards for post-quantum...
Sep 3, 2024
Est Read Time: 3 min

EU AI Regulations: What Security Practitioners Need to Know

The EU Artificial Intelligence Act has entered into force, initiating a series of compliance deadlines that will begin...
Aug 30, 2024
Est Read Time: 10 min

AI Penetration Testing: Securing LLM-based Systems against Artificial Intelligence Vulnerabilities

As artificial intelligence and large language model adoption accelerates, AI penetration testing has become...
Aug 23, 2024
Est Read Time: 6 min
    4 5 6 7 8

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.