PTaaS Checklist
Don't just "check the box". Learn 7 factors that will ensure your next pentest is a strategic advantage for your business.
PTaaS Checklist
Don't just "check the box". Learn 7 factors that will ensure your next pentest is a strategic advantage for your business.

Cybersecurity Insights (8)

Cybersecurity for Startups: Setting a Budget

Starting a company is hard, very hard.
Nov 1, 2022
Est Read Time: 6 min

CIA Triad Importance in Compliance Certification

The CIA triad represents foundational principles within the discipline of cybersecurity. The term is an acronym with...
Oct 27, 2022
Est Read Time: 5 min

Down to Business: Drive Growth and Innovation with New Security Tactics

Let’s face it, whether you’re a seasoned infosec veteran or someone who just googled how to get SOC 2 certified, this...
Sep 19, 2022
Est Read Time: 3 min

How Low Severity Vulns Become Critical: PACMAN Attack Example

Your latest pentest report was just delivered and there are a dozen findings with severity scores ranging from...
Aug 30, 2022
Est Read Time: 3 min

What Is a Bot?

A bot, short for robot, is an autonomous program that performs automatic repetitive tasks or mimics the actions of a...
Aug 23, 2022
Est Read Time: 5 min

17 Upcoming Cybersecurity Events 2022

Cybersecurity requires synergy across many different people, processes, and technology. To achieve a strong security...
Aug 15, 2022
Est Read Time: 7 min

Why Scalable Security Teams Make SO MUCH SENSE for Startups

Cobalt partner Eden Data explores a new way startups can tackle security without braking the bank.
Aug 8, 2022
Est Read Time: 5 min

Meet Judy: The Security AI Watching Out for Small and Midsize Businesses

Compliance mapping, ongoing security training, endpoint detection and response, password management, and 24/7 monitoring — if you pictured a whole team of security consultants while reading this, you’ve clearly not met Judy.
Jul 29, 2022
Est Read Time: 4 min

What is Threat Modeling?

Senior Security Consultant Gisela Hinojosa walks us through the STRIDE framework and her threat modeling process.
Jul 22, 2022
Est Read Time: 4 min
    6 7 8 9 10