Find the latest Webinar content from the Sprocket Testing Team.
Resources Blog

Sprocket Security

Blogs by Sprocket Security
The Cloud Misconfigurations Putting PHI at Risk
Mar 09, 2026

The Cloud Misconfigurations Putting PHI at Risk

Cloud misconfigurations cause 82% of healthcare breaches. Learn which S3, IAM, and network settings put PHI at risk. Find them before attackers do.
Why Connected Medical Devices Are Your New Perimeter
Mar 06, 2026

Why Connected Medical Devices Are Your New Perimeter

53% of connected medical devices have critical vulnerabilities. Learn how attackers and exploit IoT blind spots in healthcare networks and how to close them.
Ahead of the Breach – Accenture's Daniel Barnes on SAML exploitation and what really matters in pentesting
Mar 05, 2026

Ahead of the Breach – Accenture's Daniel Barnes on SAML exploitation and what really matters in pentesting

Daniel Barnes shares stories from his pentesting career and gives advice for up-and-coming offensive security professionals.
What OCR Investigators Look for After a Breach
Mar 04, 2026

What OCR Investigators Look for After a Breach

Learn what HHS OCR investigators look for after a HIPAA breach and how continuous penetration testing builds the audit trail that proves your security programs works.
How Continuous Testing Reduces Ransomware Risk in Healthcare
Mar 02, 2026

How Continuous Testing Reduces Ransomware Risk in Healthcare

Healthcare ransomware exploits the gap between tests. See how continuous penetration testing reduces exposure, speeds remediation, and protects patient care.
What a DORA TLPT Assessment Actually Requires
Feb 27, 2026

What a DORA TLPT Assessment Actually Requires

Learn what DORA’s TLPT assessment requires, why most organizations fail on preparation (not vulnerabilities), and how to build a TLPT-ready security program.
1 2 3 4 5