Sean Finley, Director of Application & Product Security at Eptura, shares invaluable insights on building effective application security programs. Learn why flooding backlogs with vulnerabilities isn't the answer and discover how to create security processes that truly serve business goals while managing risk effectively.
Resources
Blog
Sprocket Security
Blogs by Sprocket Security
Attack surface monitoring systematically examines and evaluates potential entry points for cyber threats in a system or network.
Join Microsoft’s Senior Security Researcher Vladimir Tokarev, as he shares how a gaming session led to discovering critical OpenVPN vulnerabilities, and learn his approach to successful vulnerability research through curiosity and persistence.
PTaaS offers continuous, cloud-based security through simulated cyberattacks, helping organizations identify vulnerabilities in real-time.
The vulnerability management lifecycle is a structured approach to managing potential security weaknesses in information systems.
Join Keiran Smith, Lead Pentest Engineer at N-able, as he shares his journey from teenage hacker to security leader, discussing the intersection of development and security testing, and providing insights for aspiring pentesters.