Marcy Bartlett
- Total activity 90
- Last activity
- Member since
- Following 0 users
- Followed by 0 users
- Votes 0
- Subscriptions 60
Articles
Recent activity by Marcy Bartlett-
What Happens When I Fix a Finding? When Do You Retest It?
You can either remediate or accept findings that our pentesters discover. Once you’ve fixed a finding internally, you can submit it for retest. Please visit Review and Take Action on Findings to le...
-
How do I access the findings?
On the Findings tab of the pentest page, you can view findings that our pentesters discovered during the pentest. Please visit Findings to learn more.
-
What does each state of the finding mean?
Please visit Finding States to learn more about each finding state.
-
How do I sort or filter my findings?
On the Findings tab of the pentest page, you can view findings that our pentesters discovered during the pentest. Please visit Findings to learn more.
-
Cobalt Credits Feature
Cobalt offers a flexible consumption model. Learn more about Cobalt credits, and find out how to view and track them in your dashboard.
-
Fix Common Issues with Two-Factor Authentication
Follow these instructions if you can’t sign in to Cobalt because: You lost access to your authenticator. One-time codes don’t work. “Remember this device” option doesn’t work.
-
Cloud Hosting Provider Authorization
This article describes some of the pentest requirements of different cloud hosting providers. When you set up a test with our app, we'll share network details that your security professionals or...
-
Coverage Checklist items
Vulnerabilities that Cobalt pentesters search for. OWASP Top 10 - Injection - Broken Authentication - Sensitive Data Exposure - XML External Entities (XXE) - Broken Access Contro...
-
Pentesting for PCI
PCI DSS (Payment Card Industry Data Security Standard) is a secure framework for dealing with customer credit card information. PCI compliance is to ensure that customer's credit card information i...
-
Cloud Configuration Review VS Cloud Network Pentest
I want to test the security of my AWS/GCP/Azure environment. How does that translate into penetration testing? There are two ways to look at pentesting Cloud Infrastructure environments - from ...