Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

Ahead of the Breach -Sprinklr's Roger Allen on Why Vendor Telemetry Only Gets You 90% There
Sep 09, 2025 Sprocket Security

Ahead of the Breach -Sprinklr's Roger Allen on Why Vendor Telemetry Only Gets You 90% There

Most security programs fail because they focus only on reactive detection while sidelining proactive measures. Roger Allen, Sr. Director, Global Head of Detection & Response at Sprinklr, explains why vendor telemetry gets you 90% of the way there.
Why is Continuous Pentesting a Must for Dynamic Environments?
Sep 02, 2025 Sprocket Security

Why is Continuous Pentesting a Must for Dynamic Environments?

In today's episode, Casey addresses why continuous pentesting is a must for dynamic environments.
Gear Up with Sprocket: Activity Feed
Aug 28, 2025 Topher Lyons

Gear Up with Sprocket: Activity Feed

Stay aware of attacker activity with Sprocket’s Activity Feed. Get real-time updates, context, and faster response time from CPT.
Ahead of the Breach - Andrew Grealy, Head of Armis Labs
Aug 26, 2025 Sprocket Security

Ahead of the Breach - Andrew Grealy, Head of Armis Labs

What if you could predict which vulnerabilities threat actors will weaponize months before CISA adds them to their Known Exploited Vulnerabilities list? Andrew Grealy, Head of Armis Labs, has built exactly that capability, providing organizations with threat intelligence that arrives 3-12 months ahead of traditional indicators.
How Do You Build an Offensive Security Program from Scratch?
Aug 19, 2025 Sprocket Security

How Do You Build an Offensive Security Program from Scratch?

In today's episode, Casey addresses how to build an offensive security program from scratch.
Ahead of the Breach - Covert Entry: Tools, Tricks, and True Stories from the Field
Aug 12, 2025 Sprocket Security

Ahead of the Breach - Covert Entry: Tools, Tricks, and True Stories from the Field

Brent White, Sr. Principal Security Consultant & Covert Entry Specialist at Dark Wolf Solutions, offers Casey his approach to physical security testing that goes far beyond lock picking, rooted in understanding human psychology and building systematic infiltration strategies.
1 2 3 4 5 »