Cobalt Crowdsourced Application PentestCobalt Crowdsourced Application PentestCobalt Crowdsourced Application Pentest

State of Pentesting 2019

State of Pentesting 2019

State of Pentesting 2019

Here at Cobalt, we’ve done over 1400 pentests. Based on our findings we’ve created a report that explores metrics used by top AppSec practitioners. We also discuss the Top 5 Vulnerabilities out there in the wild and look into the breakdown of security misconfiguration.

Security Touch Points in the Big Data Lifecycle


From Pen Test to Pentest


Structure Your AppSec Team for Success


Why HubSpot Moved to a Tech-Forward Approach to Pentesting


Trust + Expertise: Why Talkdesk Chose Cobalt for Pentesting


Top 4 Reasons to be ISO 27001 Compliant


Building an AppSec Budget Based on Risk Tolerance


The Challenge of Traditional Pentesting in a Modern Software Dev Environment


How customer collaboration during a pentest can lead to finding a RCE


From the Basement to the Boardroom — AppSec Business Impact is on the Rise


AppSec Testing Approaches


Nurturing the Security Mindset


A Manager’s Guide to Selecting the Best Testing Approach for Your Application Security Needs


The Challenges of Threat Modeling Modern Applications


How to Build an Efficient Security Vendor Management Process


5 Things a Pentester Looks for When Evaluating an Application


Shift AppSec Virtual Conference


OWASP Top 10 is a Good Start. Now What?


Guide to Gamifying Security: It Takes Security + Dev


What is Pentest as a Service?


Humans of InfoSec Podcast Recap Newsletter


How Pentest as a Service saves Smarsh time & money


Is Your Mobile App Storing Your Company Secrets?


How movingimage Stays Agile with Pentest as a Service


Three Signs It’s Time to Rethink Your PCI Pentesting


How Axel Springer Leverages Continuous Pentesting


2018 Pentest Metrics


How Algolia Increases Security Without Slowing Development


Cobalt 2018 Growth: European Expansion


DevSecOpsLIFE Episode 6 - Caroline Wong


Jeff Forristal: Guide to API Security Testing


Pentest as a Service Life Cycle Infographic


A new kind of security podcast: Humans of InfoSec


Analyst Research: ROI of Pentest as a Service


How to Choose a Pentesting Service


Security Testing for SaaS Startups


Cost Metrics: Exploring Pentest as a Service


Cobalt Makes Pentesting Fun for dscout


Product Demo with Co-Founder, Esben Friis-Jensen


Vendor Security Questionnaires: The Buyer’s Perspective


The 6 Stages of Pentest as a Service


Why does Security Matter for DevOps?


Analyst Webinar: Optimizing your Pentest Budget


7 Steps to Building a Yearly Pentest Plan


Crowdsourced Pentesting for Dummies


A Modern Approach to Pentesting


Women in Cybersecurity: A Progressive Movement


New Alternatives to Bug Bounty Programs


The Life Cycle of a Crowdsourced Pentest


Agari Channels the Power of Crowdsourced Pentesting


Leveraging Crowdsourced Security


Pentest Metrics


Nuna Drives Security Innovation


Pentesting for SaaS Companies


Crowdsourced Pentests and Vendor Risk Management


A Promethean Struggle: PCI's Lessons for Passwords


The Flaws in Hordes, the Security in Crowds


Crowdsourced Pentesting 101


Effective AppSec Metrics with Caroline Wong


How to Survive a Vendor Questionaire


Software Development Lifecycle #FAILS


Crowdsourced Pentesting Empowers RealtyShares SDLS


Pentest Metrics: Data from the AppSec Trenches


Crowdsourced Pentesting


What's Making Modern AppSec Effective?


Pentest Self-Assessment Questionnaire


AppSec ABCs Children's Book


A Practitioner’s Guide to Application Security


From the Basement to the Boardroom — AppSec Business Impact is on the Rise