WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting
WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting

Cybersecurity Insights

2023 Top Routinely Exploited Vulnerabilities: Zero-day Exploits on the Rise

The 2023 Top Routinely Exploited Vulnerabilities Joint Cybersecurity Advisory has been released by the Five Eyes...
Jan 17, 2025
Est Read Time: 6 min

Less Findings in your Pentest? Measuring the Effectiveness of a Penetration Test

Have you been doing pentesting for a while and getting fewer and fewer findings or fewer high-severity findings? Is it...
Jan 6, 2025
Est Read Time: 6 min

What Is Baiting in Cybersecurity: Definition, Examples, and Mitigations

Baiting represents one of the oldest scams on the Internet, but it remains one of the most common because of its...
Dec 27, 2024
Est Read Time: 4 min

Top Cybersecurity Statistics for 2025

Our 2025 cybersecurity statistics show a continuation of trends we identified in our top cybersecurity statistics for...
Dec 23, 2024
Est Read Time: 14 min

Bitcoin vs Ethereum Smart Contracts: Security Comparisons

Bitcoin vs. Ethereum smart contracts: how do they compare from a security standpoint?
Dec 19, 2024
Est Read Time: 9 min

2024 Recap: Cobalt's Top AI and LLM Security Insights

As 2024 comes to a close, we’re taking a closer look at the year’s standout cybersecurity topics: AI and LLMs. These...
Dec 17, 2024
Est Read Time: 2 min

General Hospital Cybersecurity Requirements in NYC and New York State: Rules and Recommendations

On October 2, 2024, the New York State Register published new hospital cybersecurity requirements for all general...
Dec 6, 2024
Est Read Time: 5 min

Smart Contract Security Risks: Today's 10 Top Vulnerabilities and Mitigations

Smart contracts make it easier to execute digital agreements, but they can introduce security risks that compromise...
Dec 3, 2024
Est Read Time: 6 min

What is Secure SDLC (SSDLC)? Integrating Cybersecurity into Your Software Development Lifecycle

A secure software development lifecycle strategy builds cybersecurity into program design instead of treating security...
Nov 12, 2024
Est Read Time: 8 min
    1 2 3 4 5