Find the latest Webinar content from the Sprocket Testing Team.
Resources Blog

Sprocket Security

Blogs by Sprocket Security
Ahead of the Breach - Alex Ronquillo, VP, WhoisXML API
May 20, 2025

Ahead of the Breach - Alex Ronquillo, VP, WhoisXML API

Cody explains why context is critical — a vulnerability on an isolated batch server requires different attention than one affecting your entire infrastructure.
Ahead of the Breach - Why Does Continuous Penetration Testing Outperform Bug Bounties?
May 15, 2025

Ahead of the Breach - Why Does Continuous Penetration Testing Outperform Bug Bounties?

Casey addresses "Why does continuous penetration testing outperform bug bounties?"
How Prompt Injection Works & 8 Ways to Prevent Attacks
May 13, 2025

How Prompt Injection Works & 8 Ways to Prevent Attacks

Prompt injection is a type of attack used against AI models that process natural language inputs.
Ahead of the Breach - Cody Florek, Director of Information Security Operations at Sentry
May 06, 2025

Ahead of the Breach - Cody Florek, Director of Information Security Operations at Sentry

Cody explains why context is critical — a vulnerability on an isolated batch server requires different attention than one affecting your entire infrastructure.
How Spear Phishing Attacks Work and 8 Ways to Prevent Them
May 01, 2025

How Spear Phishing Attacks Work and 8 Ways to Prevent Them

Spear phishing is a targeted email attack that appears personalized and legitimate to an individual.
Ahead of the Breach - Ayyappan Rajesh, Offensive Security Engineer at Block Harbor
Apr 22, 2025

Ahead of the Breach - Ayyappan Rajesh, Offensive Security Engineer at Block Harbor

Ayyappan Rajesh, Offensive Security Engineer at Block Harbor Cybersecurity, takes Casey deep into the technical underbelly of wireless security testing in this illuminating episode of Ahead of the Breach.
8 9 10 11 12