Penetration Testing

Penetration Testing Resources

Penetration Testing

Latest Penetration Testing Resources

Should I Complete Network Security Tests Only Once a Year?
Sep 26, 2022 Sprocket Security

Should I Complete Network Security Tests Only Once a Year?

See the infographic on the costly consequences of completing network security tests only once a year. Learn how continuous penetration testing will save you money year-round.
Creating a CVE Trends Command Line Tool
Aug 29, 2022 Nicholas Anastasi

Creating a CVE Trends Command Line Tool

How to create a CVE Trends Command Line Tool and be notified in Slack via Webhooks.
Exploiting N-Day Vulnerabilities at Scale with CPT
Jul 19, 2022 Nate Fair

Exploiting N-Day Vulnerabilities at Scale with CPT

A basic guide on how Sprocket utilizes Continuous Penetration Testing to rapidly identify and exploit vulnerabilities.
Traditional vs. Continuous Pentesting: A Comparison Checklist
Oct 07, 2021 Sprocket Security

Traditional vs. Continuous Pentesting: A Comparison Checklist

We get a lot of questions about what makes continuous penetration testing more valuable than traditional timebox testing. Seriously, A LOT of questions – all of which are warranted. Take a look below, and we’re pretty sure you’ll see the benefits when the two methods are stacked side-by-side.
CPT in the wild: 3 real-world examples that prove its value
Sep 09, 2021 Sprocket Security

CPT in the wild: 3 real-world examples that prove its value

We get it, regular ol’ once-a-year penetration testing is the norm. It’s what your company has budgeted for, what you’re IT team is used to, and in many cases, what your expected to do. But that doesn’t mean it’s the best way to protect your network. Think about this: Why would you test your network security from emerging cyber-security threats only...
Fourteen good reasons to require 14-character passwords
Jun 15, 2021 Sprocket Security

Fourteen good reasons to require 14-character passwords

Password. Password123. Yea, you’ve seen them all when it comes to bad passwords. It comes standard when managing IT security. But while your organization likely requires special characters, uppercase letters and even a number or two, if you don’t require longer passwords you’re not taking one of the most important steps to protect your network.
« 4 5 6 7 8 »