Find the latest Webinar content from the Sprocket Testing Team.
Resources Blog

Greg Anderson

Blogs by Greg Anderson
AI Is Accelerating Attacks, Not Reinventing Them: What Anthropic’s Research Really Tells Us
Nov 20, 2025

AI Is Accelerating Attacks, Not Reinventing Them: What Anthropic’s Research Really Tells Us

AI isn't creating new cyberattacks. It's making existing ones faster and more scalable. Learn what Anthropic's research really reveals about AI-enabled threats and how organizations can prepare.
Closing the Gap Between Finding and Fix: Introducing AI Remediation Assistance
Nov 13, 2025

Closing the Gap Between Finding and Fix: Introducing AI Remediation Assistance

Learn how Sprocket’s AI Remediation Assistance turns vague vulnerability findings into clear, actionable fixes.
The Pentester Rotation Myth
Oct 14, 2025

The Pentester Rotation Myth

Rotating pentesters every year may sound like getting “fresh eyes,” but it often resets progress and weakens security maturity. Learn why continuity-based penetration testing, anchored in frameworks like MITRE ATT&CK and iterative feedback loops, drives deeper insight, faster remediation, and stronger defenses over time.
From Threat Volume to Real-World Exposure: What the 2025 Comcast Cybersecurity Threat Report Tells Us
Oct 03, 2025

From Threat Volume to Real-World Exposure: What the 2025 Comcast Cybersecurity Threat Report Tells Us

Comcast Business Cybersecurity Threat Report analyzed events, revealing how attackers are shifting tactics and accelerating the pace at which exposures become exploitable. We will expand on four of the threats that keep showing up in breach postmortems, how they work in reality, and what organizations should do about them.
Attack Surface Management (ASM): What You’re Missing and Why It Matters
Mar 06, 2025

Attack Surface Management (ASM): What You’re Missing and Why It Matters

Discover the importance of Attack Surface Management (ASM) and what you're overlooking to protect your business from cyber threats.
Moving from Snapshots to Strategy: Why CTEM is Essential for Security Leaders
Mar 04, 2025

Moving from Snapshots to Strategy: Why CTEM is Essential for Security Leaders

Discover why Continuous Threat Exposure Management (CTEM) is crucial for security leaders. Learn how moving to real-time threat management can enhance your organization's cybersecurity resilience.
1 2