WEBINAR
Stop Pentesting like it’s 2006: 6 Modern Lessons from the GigaOm Radar
WEBINAR
Stop Pentesting like it’s 2006: 6 Modern Lessons from the GigaOm Radar

Cybersecurity Insights (14)

Winning the Security Budget Fight With Tips From Security Executives

October 27, 2021
Est Read Time: 4 min
Are you preparing for next year's security budget? Budget negotiations can be pivotal in guaranteeing the right...
Cybersecurity Insights

Terraform, The Less-Common Commands And Options

September 14, 2021
Est Read Time: 5 min
This post was originally published on cloudlad.io
Cybersecurity Insights

Pentesting for the Merger & Acquisition Sector: Cybersecurity Due Diligence

September 13, 2021
Est Read Time: 4 min
Mergers and acquisitions (M&A) are a main driver of growth for many organizations, with the main objective of...
Cybersecurity Insights

How Pentesting Differs from Ethical Hacking

August 31, 2021
Est Read Time: 3 min
Pentesting and ethical hacking consist of two similar, but very different cybersecurity practices.
Cybersecurity Insights

Cobalt API: Import Your Findings to Google Sheets

June 6, 2021
Est Read Time: 8 min
Make sure to check out our Integrations page for more info! Last week we announced the launch of the Cobalt API—a...
Cybersecurity Insights

Mapping Cyberattacks to Maslow's Hierarchy of Needs

May 28, 2021
Est Read Time: 5 min
Maslow’s Hierarchy of Needs outlines the theory that human needs exist in a hierarchical structure. The hierarchy...
Cybersecurity Insights

IaC Pipelines With Terraform And Cloud Build

May 2, 2021
Est Read Time: 8 min
“Today, most software exists, not to solve a problem, but to interface with other software.” — IO Angell In this blog...
Cybersecurity Insights

How to Identify the Different Types of Malware

April 16, 2021
Est Read Time: 3 min
Cyberattacks continue to rise, with the level of sophistication of the attacks growing as businesses and organizations...
Cybersecurity Insights

CISOs Assemble: Shaping a Security Strategy

April 5, 2021
Est Read Time: 4 min
Cybersecurity Insights