Demo
Learn how Cobalt’s Pentest as a Service (PtaaS) model makes you faster, better, and more efficient.
Demo
Learn how Cobalt’s Pentest as a Service (PtaaS) model makes you faster, better, and more efficient.

Modernizing Pentesting (3)

2023 Cobalt Partnerships: Expanding to MSP & MSSP Partners

When companies work together to provide better solutions for their clients, everyone wins.
Jan 12, 2023
Est Read Time: 2 min

A Brief History of Hacking

The history of hacking offers a colorful background dated all the way back to the late 1800s.
Dec 5, 2022
Est Read Time: 4 min

What is Penetration Testing?

Penetration testing simulates cyberattacks against a digital system to discover vulnerabilities ranging from security...
Sep 22, 2022
Est Read Time: 6 min

Cobalt's PtaaS Exchange: Insights You Don't Want to Miss

The Cobalt PtaaS Exchange Roadshow kicks off on September 8th in San Francisco. It’s never too late to sign up for a...
Sep 8, 2022
Est Read Time: 4 min

ESG Report: Cobalt Customers Fix Vulnerabilities 66% Faster for Half the Cost

Enterprise Strategy Group (ESG) put us to the test, analyzing Cobalt-provided material, public and industry knowledge of pentesting and security practices, and the results of customer interviews and subject-matter experts. 
Aug 3, 2022
Est Read Time: 3 min

The PtaaS Book Sneak Peek: Chapter 5 —Agile Pentesting and DevOps

Fewer vulnerabilities and faster patches. It's not a pipe dream — it's Pentest as a Service.
Jul 4, 2022
Est Read Time: 4 min

Is BAS the Self-Driving Car of the Penetration Testing Industry?

BAS — Breach Attack Simulation — is one of the hot new acronyms on the block. Let's take a closer look.
May 5, 2022
Est Read Time: 5 min

When is Pentesting Most Effective?

Experience the benefits of better pentesting: Learn more about when pentesting is the most effective.
Apr 22, 2022
Est Read Time: 2 min

The State of Pentesting 2022: Technical Breakdowns of The Most Common Vulnerabilities

Each year Cobalt publishes The State of Pentesting report to explore common vulnerabilities and provide key security insights.
Apr 14, 2022
Est Read Time: 8 min
    1 2 3 4 5