Find the latest Webinar content from the Sprocket Testing Team.

Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

Ahead of the Breach - Nir Rothenberg, CISO/CIO, Rapyd
Feb 13, 2025 Sprocket Security

Ahead of the Breach - Nir Rothenberg, CISO/CIO, Rapyd

Nir Rothenberg, CISO/CIO at Rapyd, takes us behind the scenes of Pegasus, one of the most discussed cyber tools in recent history.
Ahead of the Breach - Sean Finley, Director of Application & Product Security, Eptura
Jan 28, 2025 Sprocket Security

Ahead of the Breach - Sean Finley, Director of Application & Product Security, Eptura

Sean Finley, Director of Application & Product Security at Eptura, shares invaluable insights on building effective application security programs. Learn why flooding backlogs with vulnerabilities isn't the answer and discover how to create security processes that truly serve business goals while managing risk effectively.
Attack Surface Monitoring: Core Functions, Challenges and Best Practices
Jan 21, 2025 Sprocket Security

Attack Surface Monitoring: Core Functions, Challenges and Best Practices

Attack surface monitoring systematically examines and evaluates potential entry points for cyber threats in a system or network.
Ahead of the Breach - Vladimir Tokarev, Senior Security Researcher, Microsoft
Jan 14, 2025 Sprocket Security

Ahead of the Breach - Vladimir Tokarev, Senior Security Researcher, Microsoft

Join Microsoft’s Senior Security Researcher Vladimir Tokarev, as he shares how a gaming session led to discovering critical OpenVPN vulnerabilities, and learn his approach to successful vulnerability research through curiosity and persistence.
Penetration Testing as a Service: Pros/Cons and Choosing a Provider
Jan 10, 2025 Sprocket Security

Penetration Testing as a Service: Pros/Cons and Choosing a Provider

PTaaS offers continuous, cloud-based security through simulated cyberattacks, helping organizations identify vulnerabilities in real-time.
6 Stages of the Vulnerability Management Lifecycle
Jan 08, 2025 Sprocket Security

6 Stages of the Vulnerability Management Lifecycle

The vulnerability management lifecycle is a structured approach to managing potential security weaknesses in information systems.
« 2 3 4 5 6 »