WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting
WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

How to Survive a Vendor Security Questionnaire

Tips on vendor assessments from experts in the industry
Aug 14, 2017
Est Read Time: 7 min

New Alternatives to Bug Bounty Programs

Before you can choose the right approach to test your application security, you first need to understand your options —...
Aug 2, 2017
Est Read Time: 4 min

UX-Friendly Enumeration Protection in Ruby on Rails

How to avoid revealing the existence of records to attackers in web applications, while keeping a good user experience...
May 23, 2017
Est Read Time: 4 min

Penetration Testing for SaaS Companies

SaaS companies have fundamentally transformed the enterprise software model and at this point it seems there is no...
May 8, 2017
Est Read Time: 3 min

Start at Zero with the OWASP Top 10

Engineering is an exercise in working within constraints. Appsec increases those constraints, forcing developers to...
Apr 24, 2017
Est Read Time: 3 min

Introducing In-App Pentest Reports

My name is Kevin Bourne and I recently joined Cobalt as their new Customer Success Manager. My primary responsibility...
Mar 28, 2017
Est Read Time: 1 min

Crowdsourced Penetration Testing and PCI DSS Compliance

Various regulatory requirements that are lurking across different industries — involving different aspects of...
Mar 20, 2017
Est Read Time: 5 min

Pen Test Metrics 101: Detailed Definitions

This post is the second in a series I am writing about how to use pen test data in security metrics to analyze and...
Jan 9, 2017
Est Read Time: 6 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.