Policy and Best Practices Resources

Policy and Best Practices

Latest Policy and Best Practices Resources

Essential Cybersecurity Terms Every Organization Should Know
Mar 03, 2025 Sprocket Security

Essential Cybersecurity Terms Every Organization Should Know

If you’re not in the cybersecurity trenches daily, it can be tough to get a clear understanding of many popular terms used by the professionals testing your organization’s network.
Ahead of the Breach - Vladimir Tokarev, Senior Security Researcher, Microsoft
Jan 14, 2025 Sprocket Security

Ahead of the Breach - Vladimir Tokarev, Senior Security Researcher, Microsoft

Join Microsoft’s Senior Security Researcher Vladimir Tokarev, as he shares how a gaming session led to discovering critical OpenVPN vulnerabilities, and learn his approach to successful vulnerability research through curiosity and persistence.
5 Penetration Testing Standards to Know in 2025
Jan 02, 2025 Sprocket Security

5 Penetration Testing Standards to Know in 2025

Penetration testing standards are structured guidelines that define best practices, methodologies, and procedures for executing security assessments.
Attack Surface vs Attack Vector: Understanding the Difference
Dec 19, 2024 Sprocket Security

Attack Surface vs Attack Vector: Understanding the Difference

Penetration testing, or pentesting, simulates an attack on a system to evaluate its defenses. Vulnerability testing identifies and evaluates system security weaknesses.
Ahead of the Breach - Lorenzo Pedroncelli, Senior Manager at RSA Security
Dec 18, 2024 Sprocket Security

Ahead of the Breach - Lorenzo Pedroncelli, Senior Manager at RSA Security

Ahead of the Breach Podcast sits down with Lorenzo Pedroncelli, Senior Manager at RSA Security, to discuss his thoughts on identity security as a cornerstone of cybersecurity.
Pentest Reports: Traditional Reporting vs. Continuous Pentesting
Dec 13, 2024 Sprocket Security

Pentest Reports: Traditional Reporting vs. Continuous Pentesting

Vulnerability scanning as a service is a solution that uses cloud-based tools to identify vulnerabilities in an organization's digital infrastructure.
« 1 2 3 4 5 »