THREE PEAT
GigaOm Names Cobalt an “Outperformer” for Third Consecutive Year in Annual Radar Report for PTaaS.
THREE PEAT
GigaOm Names Cobalt an “Outperformer” for Third Consecutive Year in Annual Radar Report for PTaaS.

Cybersecurity Insights (6)

Security Touchpoints in the Big Data Lifecycle

More and more teams want to access the sensitive data you're managing? Here's a guide on how to keep it secure while enabling the business to innovate.
Feb 28, 2023
Est Read Time: 9 min

Back to Basics: How to Build Resilient Blue Teams

A comprehensive guide on how security teams can keep up with organizational change.
Feb 24, 2023
Est Read Time: 11 min

Pentests in Risk Assessments: When, Why, How

Find your vulnerabilities, determine the risk, and outline remediation — pentests can do all of this in support of your risk assessments.
Feb 14, 2023
Est Read Time: 3 min

Man-In-The-Middle Attacks: How to Detect and Prevent

This article covers the steps cybercriminals commonly take to execute different MITM attacks, and how security teams can detect and prevent them.
Jan 24, 2023
Est Read Time: 5 min

Cybersecurity Statistics for 2023

Every year in security we hear about more cyberattacks. With ransomware, zero-day exploits, data breaches, and such...
Dec 27, 2022
Est Read Time: 15 min

Dangers of Ransomware through File-Sharing Software

First appeared on Cybersecurity Magazine. Ransomware is an ever-growing threat to businesses and consumers alike....
Dec 13, 2022
Est Read Time: 3 min

Beginner Cybersecurity Tips

The holiday season brings about the traditional business of shopping for gifts, decorating, and traveling but it also...
Dec 9, 2022
Est Read Time: 3 min

Importance of Setting Security Goals in the Planning Process

Setting an end goal is important. As Frank Covey puts it, we should always aim to start with the end goal in mind....
Nov 22, 2022
Est Read Time: 3 min

PtaaS Roadshow Recap: Into the Hacker’s Mind

Cobalt Core members Vanessa Sauter, Derek Carlin, and Andreea Cristina Druga share insights on how to prepare for a pentest, what tools they use to stress test your assets, and the steps they take to check what vulnerabilities you’re susceptible to.
Nov 18, 2022
Est Read Time: 5 min
    4 5 6 7 8