WHITEPAPER
The Offensive Security Blueprint: A Guide to Building a Modern, Strategic Program
WHITEPAPER
The Offensive Security Blueprint: A Guide to Building a Modern, Strategic Program

Blog

Thoughts, perspectives, and industry commentary from the Cobalt team.

How To Strengthen the Relationship Between Security and Engineering

Historically, there has been a disconnect between security and engineering teams.
Mar 15, 2020
Est Read Time: 3 min

Anatomy of Authentication Tests

Introduction Authentication, as OWASP states, is the process of verifying that an individual, entity, or website is who...
Mar 5, 2020
Est Read Time: 4 min

Enhancements to our Pentest as a Service platform empower agile development teams

Over the past two years, we’ve had the pleasure of hosting a Customer Advisory Board, where we bring together some of...
Mar 4, 2020
Est Read Time: 2 min

The Anatomy of Deserialization Attacks

What is Deserialization? Serialization is the process of turning some object into a data format that can be restored...
Jan 23, 2020
Est Read Time: 7 min

What traits do successful pentesters have in common?

We surveyed the Cobalt Core — our community of pentesters — to hear what they value most when working with other...
Jan 9, 2020
Est Read Time: 3 min

Understanding the Anatomy of an Attack

Notable, high-impact security breaches sadly make regular headlines. You might be tempted to dismiss the latest as just...
Nov 21, 2019
Est Read Time: 9 min

How to Scope a Network Penetration Test: Tips from an Expert Pentester

During a network pentest engagement, time is of the essence. A penetration tester has a fixed amount of time, typically...
Oct 3, 2019
Est Read Time: 4 min

    Always get the latest

    Sign up to get Cobalt insights delivered right to your inbox so you never miss a story.

    More resources

    Learn pentesting best practices, read answers to our most common questions
    and get our technical docs.