Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

Ahead of the Breach - What Should You Ask Before Choosing an Offensive Security Platform?
Aug 05, 2025 Sprocket Security

Ahead of the Breach - What Should You Ask Before Choosing an Offensive Security Platform?

In this episode, Casey addresses the questions you should ask before choosing an offensive security platform.
Ahead of the Breach - Phillip Wylie, Penetration Tester & Podcast Host at The Phillip Wylie Show
Jul 30, 2025 Sprocket Security

Ahead of the Breach - Phillip Wylie, Penetration Tester & Podcast Host at The Phillip Wylie Show

Phillip Wylie, Penetration Tester & Podcast Host of The Phillip Wylie Show, shares why annual penetration testing creates dangerous gaps that threat actors are increasingly exploiting through non-traditional attack vectors like IoT devices.
Ahead of the Breach - What Tools Do You Need for an Offensive Security Stack?
Jul 22, 2025 Sprocket Security

Ahead of the Breach - What Tools Do You Need for an Offensive Security Stack?

In this episode, Casey addresses the tools needed for an offensive security stack.
Ahead of the Breach - Brett Price, Lead Cybersecurity Consultant & vCISO at AccessIT Group
Jul 15, 2025 Sprocket Security

Ahead of the Breach - Brett Price, Lead Cybersecurity Consultant & vCISO at AccessIT Group

Brett Price, Lead Cybersecurity Consultant & vCISO at AccessIT Group, shares his data-first approach to building security programs that actually work.
Ahead of the Breach - What Steps Should You Take to Build a Modern Pentesting Program?
Jul 08, 2025 Sprocket Security

Ahead of the Breach - What Steps Should You Take to Build a Modern Pentesting Program?

In today's episode, Casey addresses 5 steps to building a modern pentesting program.
Ahead of the Breach - Parthasarathi Chakraborty, Former Deputy CISO at Natixis
Jul 01, 2025 Sprocket Security

Ahead of the Breach - Parthasarathi Chakraborty, Former Deputy CISO at Natixis

Parthasarathi Chakraborty, Former Deputy CISO at Natixis CIB, shares his approach to transforming security architecture from theoretical frameworks to measurable business impact.
1 2 3 4 5 »