Demo
Learn how Cobalt’s Pentest as a Service (PtaaS) model makes you faster, better, and more efficient.
Demo
Learn how Cobalt’s Pentest as a Service (PtaaS) model makes you faster, better, and more efficient.

Jacob Fox

Jacob Fox is a search engine optimization manager at Cobalt. He graduated from the University of Kansas with a Bachelor of Arts in Political Science. With a passion for technology, he believes in Cobalt's mission to transform traditional penetration testing with the innovative Pentesting as a Service (PtaaS) platform. He focuses on increasing Cobalt's marketing presence by helping craft positive user experiences on the Cobalt website.

Navigating the Future of DevSecOps: A Deep Dive into the SANS 2023 Survey

As the tech industry continues to evolve at a rapid pace, organizations are striving to remain competitive and secure...
Oct 4, 2023
Est Read Time: 4 min

How Layering Solutions Helps Create an Offensive Security Strategy

In today's digitized landscape, the question isn't if a security threat will arise but when. A holistic, multi-layered...
Sep 29, 2023
Est Read Time: 5 min

Offensive Security within the Software Development Life Cycle (SDLC)

Integrating security measures within each stage of the Software Development Life Cycle (SDLC) helps organizations...
Sep 27, 2023
Est Read Time: 4 min

Casino Cyberattacks: A Wake-Up Call on the Threat of Vishing

As casinos and businesses in general increasingly rely on digital technology, they are becoming more vulnerable to...
Sep 22, 2023
Est Read Time: 5 min

Thinking Like an Attacker: Balancing Offensive and Defensive Cyber Tactics

In cybersecurity, strategies are broadly divided into two categories: offensive and defensive. While both approaches...
Sep 19, 2023
Est Read Time: 6 min

Offensive Security Maturity: How Offensive Security Strategies Evolve Based on Company Maturity

A business's success relies not only on its ability to innovate but also on its commitment to safeguarding its digital...
Sep 15, 2023
Est Read Time: 7 min

The Evolution of Software Development from SDLC to SSDLC

Every piece of software, from mobile apps to intricate enterprise solutions, is developed using a structured process....
Aug 31, 2023
Est Read Time: 5 min

Understanding Data Security Compliance

Every digital interaction with customers or services relies on data. And there's a clear responsibility that comes with...
Aug 30, 2023
Est Read Time: 7 min

Security is Everyone's Business: What is Good Security Culture?

The pandemic accelerated the digital transformation of businesses worldwide. Suddenly, departments that traditionally...
Aug 29, 2023
Est Read Time: 5 min
    1 2 3 4 5