Demo
Learn how Cobalt’s Pentest as a Service (PtaaS) model makes you faster, better, and more efficient.
Demo
Learn how Cobalt’s Pentest as a Service (PtaaS) model makes you faster, better, and more efficient.

Jacob Fox

Jacob Fox is a search engine optimization manager at Cobalt. He graduated from the University of Kansas with a Bachelor of Arts in Political Science. With a passion for technology, he believes in Cobalt's mission to transform traditional penetration testing with the innovative Pentesting as a Service (PtaaS) platform. He focuses on increasing Cobalt's marketing presence by helping craft positive user experiences on the Cobalt website.

AppSec vs. DevSecOps

AppSec and DevSecOps offer similar but different approaches to cybersecurity. By understanding the differences,...
Jul 20, 2022
Est Read Time: 3 min

Top 10 Hacking Movies of All Time

Movies about hackers boomed in popularity towards the end of the 21st century. Ranging from cult classics such as The...
Jun 8, 2022
Est Read Time: 7 min

Difference Between Security Incident and Breach

Reports of cyber attacks, online breaches, and hacks occur more and more frequently. With this disturbing trend on the...
Jun 3, 2022
Est Read Time: 2 min

Generating Actionable Pentest Results with PtaaS

Pentesting requires companies to do more than simply receive a report at the end of the test.
Dec 29, 2021
Est Read Time: 3 min

Top Holiday Gifts for Programmers, Coders, and Engineers

Looking for the next great gift to give a special computer wizard in your life? We’ve got you covered!
Dec 14, 2021
Est Read Time: 4 min

How to Perform Azure Pentesting

Companies are benefiting from an increasing supply of cloud services. The ability to outsource features and functions...
Nov 17, 2021
Est Read Time: 3 min

What is Web Application Penetration Testing?

Web application pentesting is the best method of discovering flaws in web applications. Otherwise known as penetration...
Nov 2, 2021
Est Read Time: 3 min

How Pentesting Differs from Ethical Hacking

Pentesting and ethical hacking consist of two similar, but very different cybersecurity practices.
Aug 31, 2021
Est Read Time: 3 min

How Pentest as a Service Benefits Developers for Vulnerability Remediation

The pentesting process challenges both security professionals and engineering teams.
Aug 6, 2021
Est Read Time: 3 min
    5 6 7 8 9