Demo
Learn how Cobalt’s Pentest as a Service (PtaaS) model makes you faster, better, and more efficient.
Demo
Learn how Cobalt’s Pentest as a Service (PtaaS) model makes you faster, better, and more efficient.

Modernizing Pentesting

Common Network Security Vulnerabilities

Understanding network vulnerabilities is a critical aspect of cybersecurity. This knowledge is not just about...
Dec 6, 2023
Est Read Time: 6 min

Requirement to Change Pentest Vendors: Fact or Fiction?

There are a number of practices in the information security field that have traditionally been followed out of good...
Sep 13, 2023
Est Read Time: 3 min

The Role of Threat Modeling in Penetration Testing

This article was originally published on Cybersecurity Magazine.
Jul 20, 2023
Est Read Time: 6 min

A Comprehensive Guide to AWS Pentesting

Take a closer look at what AWS pentesting is and how you can perform a pentest on AWS.
Jun 29, 2023
Est Read Time: 6 min

What is Continuous Pentesting?

Learn more about how a continuous pentesting program with Agile Pentesting helps improve your security posture.
Jun 23, 2023
Est Read Time: 3 min

Pentest Checklist: Preparing for a Penetration Test

Preparing for a penetration test can be stressful to say the least.
Jun 14, 2023
Est Read Time: 4 min

How To Create and Scale a Penetration Testing Policy

Penetration testing involves simulating the behavior of a threat actor to assess the resilience of an organization’s...
May 4, 2023
Est Read Time: 4 min

Pentesting Containers: Overview & Security Best Practices

Containers are packages that provide operating system (OS) Level Virtualization. They deliver software or an...
Apr 28, 2023
Est Read Time: 4 min

Manual Versus Automated Penetration Testing

Penetration testing or pentesting is the process of finding vulnerabilities in a company's systems by simulating a...
Apr 26, 2023
Est Read Time: 9 min
    1 2 3 4 5