Blogs

Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

External Attack Surface Management: 5 Key Capabilities
Nov 14, 2024 Sprocket Security

External Attack Surface Management: 5 Key Capabilities

External attack surface management (EASM) focuses on managing and securing an organization's digital assets exposed to external threats.
7 Types of Web Application Testing and Building a Testing Strategy
Nov 12, 2024 Sprocket Security

7 Types of Web Application Testing and Building a Testing Strategy

Web application testing involves evaluating an application to ensure its functionality, security, and usability meet the required standards before deployment.
Ahead of the Breach - Joe Mariscal, Director of Cybersecurity and Compliance at Ryerson
Nov 07, 2024 Sprocket Security

Ahead of the Breach - Joe Mariscal, Director of Cybersecurity and Compliance at Ryerson

Ahead of the Breach Podcast sits down with Joe Mariscal, Director of Cybersecurity and Compliance at Ryerson, as he shares his journey from the Marines to building a robust cybersecurity program and emphasizes the importance of leadership in preventing burnout among teams.
Automated Penetration Testing: Process, Pros/Cons and Best Practices
Oct 30, 2024 Sprocket Security

Automated Penetration Testing: Process, Pros/Cons and Best Practices

Automated penetration testing uses specialized software to quickly identify vulnerabilities across networks and applications without manual intervention. Read on to learn about the pros and cons of this pentesting method.
What Is Attack Surface Reduction and 6 Ways to Reduce Yours
Oct 25, 2024 Sprocket Security

What Is Attack Surface Reduction and 6 Ways to Reduce Yours

A company's attack surface naturally grows with the company, but there are still ways to reduce possible entry points for attackers. Learn 6 ways to reduce your attack surface below.
What Is Continuous Threat Exposure Management (CTEM)?
Oct 24, 2024 Sprocket Security

What Is Continuous Threat Exposure Management (CTEM)?

Continuous threat exposure management (CTEM) is a framework for identifying, assessing, and mitigating cybersecurity threats in a dynamic environment. Learn how using CTEM helps your company against threats.
« 7 8 9 10 11 »