
MythBusters: What pentesting is (and what it is not)
You’ve probably seen the term pentesting pop up in security research and articles, but do you know what it really means? Simply put, penetration testing is a security …
Saltworks partners with Secure Code Warrior on secure coding for DevOps
Saltworks announced a partnership with Secure Code Warrior to elevate the importance and accessibility of secure code education and skills development. By helping developers …
Cobalt Partner Program offers new opportunities for partners
Cobalt announced the launch of its Partner Program. The program comes amid massive customer demand as organizations realize the need for an optimized and streamlined …
Cobalt names Eric Brinkman as Chief Product Officer
Cobalt announced it has named Eric Brinkman as its new Chief Product Officer. In this role, Brinkman will lead Cobalt’s product vision, enhancing the existing suite of …

Get your free ticket to Cobalt’s SecTalks virtual conference
How can military experience help build resilience in information security? What lessons in perseverance and resilience can we pick up from an aerospace consultant who learned …

What’s at stake in the Computer Fraud and Abuse Act (CFAA)
Two weeks ago, the Supreme Court heard oral arguments in Van Buren vs. United States, the landmark case over the Computer Fraud and Abuse Act (CFAA). Nathan Van Buren, the …

Q&A session: Examples of what it takes to achieve DevSecOps maturity
Join Cobalt for an interactive 1-hour Q&A session that tackles real-life examples of what it takes to achieve DevSecOps maturity. In the security corner will be Caroline …

New additions to RSA Conference Advisory Board bring wealth of industry knowledge
RSA Conference, the world’s leading information security conferences and expositions, today announced the addition of nine new members to its Advisory Board for a total of 16 …
ShiftLeft demonstrates application protection in the first test of its kind
ShiftLeft announced the public real-world benchmark of its application security solution. The test measured ShiftLeft’s ability to protect an application against exploit …

Why you need a tailored application security program
For companies that provide applications to their customers, keeping those applications secure is a must. Setting up an application security program is the next logical step, …
Featured news
Resources
Don't miss
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?
- Why AI agents could be the next insider threat
- Money mule networks evolve into hierarchical, business-like criminal enterprises