WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting
WEBINAR
GigaOm Radar Report for PTaaS: How to Make a Smarter Investment in Pentesting

Cybersecurity Insights (11)

The Resource Gap and Compliance Framework Overlap

Learn more about approaches companies can employ to address the resource gap without sacrificing security.
Feb 22, 2022
Est Read Time: 4 min

How to Strengthen Cybersecurity with Terraform, Sumo Logic, and GCP

Learn what processes and tools Cobalt uses to govern and improve its security posture.
Jan 24, 2022
Est Read Time: 9 min

Types of Security Risks that Threaten Schools

Data security is a high priority across industries. This includes the education sector where confidential files and...
Dec 20, 2021
Est Read Time: 3 min

Pentesting vs DAST: What is Your DAST Tool Missing?

The uptick in technology and a digital-first approach to business provides many benefits. However, it also creates...
Dec 3, 2021
Est Read Time: 2 min

What Is Sensitive Data?

With large amounts of data processed each day by IT systems and networks, it’s imperative that organizations know how...
Nov 22, 2021
Est Read Time: 3 min

Winning the Security Budget Fight With Tips From Security Executives

Are you preparing for next year's security budget? Budget negotiations can be pivotal in guaranteeing the right...
Oct 27, 2021
Est Read Time: 4 min

Terraform, The Less-Common Commands And Options

This post was originally published on cloudlad.io
Sep 14, 2021
Est Read Time: 5 min

Pentesting for the Merger & Acquisition Sector: Cybersecurity Due Diligence

Mergers and acquisitions (M&A) are a main driver of growth for many organizations, with the main objective of...
Sep 13, 2021
Est Read Time: 4 min

How Pentesting Differs from Ethical Hacking

Pentesting and ethical hacking consist of two similar, but very different cybersecurity practices.
Aug 31, 2021
Est Read Time: 3 min
    9 10 11 12 13