Jacob HansenNew Report: A Comprehensive Analysis of Pentest Vendors“The Magic Cube” by Osterman Research evaluates providers against talent, delivery, and valueJan 16, 2020Jan 16, 2020
Jacob Hansen2020 Pentest Predictions: Platforms, Sprints, and Analytics2019 has been an interesting year for cybersecurity.Dec 27, 2019Dec 27, 2019
Jacob HansenNew Alternatives to Bug Bounty ProgramsBefore you can choose the right approach to test your application security, you first need to understand your options — and the economics…Aug 2, 2017Aug 2, 2017
Jacob HansenSimple Sabotage Manual — CIAWow.. recently I came across the simple sabotage manual which the CIA developed during WWII. It is a real gem and outlines how one could…Feb 18, 2017Feb 18, 2017
Jacob HansenThe Third Wave of Application SecurityThe emergence of crowdsourced application security platforms, fueled by data and technology, has incited a new wave of change in the…Jan 27, 2017Jan 27, 2017
Jacob HansenDeconstructing and Rewiring Bug Bounty ProgramsOn the surface, public bug bounty programs look like a no-brainer. You invite a number of security researchers to find security issues in…Mar 24, 2016Mar 24, 2016
Jacob HansenCobalt. Connected Intelligent Security.Today Crowdcurity becomes Cobalt.Jun 14, 2015Jun 14, 2015
Jacob HansenIntroducing RepSince our launch in September 2013 we have connected hundreds of businesses with thousands of security researchers. One of our most…Feb 19, 2015Feb 19, 2015
Jacob HansenCobalt Raises 1 Million in FundingSince launching Cobalt in 2013, our clients have shown us that there is a huge demand for crowdsourced application security. It is easier…Jul 28, 2014Jul 28, 2014