Please turn on your JavaScript for this page to function normally.
cybersecurity budget
Facts and misconceptions about cybersecurity budgets

Managing and allocating budgets for cybersecurity and IT has become an increasingly critical aspect of organizational strategy. Organizations recognize the need to invest …

data breaches
When data falls into the wrong hands

A data breach involves unauthorized access to sensitive, protected, or confidential information, often resulting in data theft, exposure, or alteration. The methods employed …

Infosecurity Europe 2023
Photos: Infosecurity Europe 2023

Infosecurity Europe 2023 is taking place at ExCeL London from 20-22 June 2023 and Help Net Security is on site. The second gallery is available here. Here’s a closer …

drown
Tight budgets and burnout push enterprises to outsource cybersecurity

With cybersecurity teams struggling to manage the remediation process and monitor for vulnerabilities, organizations are at a higher risk for security breaches, according to …

idea
Stay one step ahead: Cybersecurity best practices to prevent breaches

In this Help Net Security video, Caroline Wong, Chief Strategy Officer at Cobalt, offers valuable insight into what leaders can do to instill stronger cybersecurity practices …

Black Hat USA 2022
Photos: Black Hat USA 2022

Here’s a photo gallery that provides a look inside Black Hat USA 2022. For our complete coverage of the conference, live from Las Vegas, check out our microsite. Bayside …

Black Hat USA 2022
Black Hat USA 2022 video walkthrough

In this Help Net Security video, we take you inside Black Hat USA 2022 at the Mandalay Bay Convention Center in Las Vegas. The video features the following vendors: Abnormal …

Handshake
Whistic collaborates with Cobalt to reduce risks that come from onboarding third-party applications

Whistic collaborates with Cobalt to enable vendors to consolidate all of their security documentation, including standard questionnaires, certifications, audits, and pentests …

Cobalt PtaaS
Find out why developers love Pentest as a Service (PtaaS)

Pentest as a Service (PtaaS) allows organizations of all sizes to manage an efficient pentest program with on-demand access to expert security talent and a modern SaaS …

Cobalt State of Pentesting 2022 report
State of Pentesting 2022 report: Interactive event and open discussion

In The State of Pentesting 2022 Report, Cobalt studied data from 2,380 pentests and surveyed 602 cybersecurity and software development professionals. The report focuses on …

Handshake
DeFinity partners with Cobalt to enable dynamic credit management of digital asset trades

DeFinity partners with Cobalt to facilitate real-time clearing, settlement and dynamic risk and credit management. Manu Choudhary, CEO and Co-founder of DeFinity, said, …

The ROI of Modern Pentesting 2021
Report: The ROI of Modern Pentesting 2021

Does your pentesting program bring enough value? Find out in this exclusive in-depth report comparing Pentest as a Service (PtaaS) vs. traditional consulting engagements and …

Don't miss

Cybersecurity news