Policy and Best Practices

Policy and Best Practices Resources

Policy and Best Practices

Latest Policy and Best Practices Resources

Ahead of the Breach - Vladimir Tokarev, Senior Security Researcher, Microsoft
Jan 14, 2025 Sprocket Security

Ahead of the Breach - Vladimir Tokarev, Senior Security Researcher, Microsoft

Join Microsoft’s Senior Security Researcher Vladimir Tokarev, as he shares how a gaming session led to discovering critical OpenVPN vulnerabilities, and learn his approach to successful vulnerability research through curiosity and persistence.
5 Penetration Testing Standards to Know in 2025
Jan 02, 2025 Sprocket Security

5 Penetration Testing Standards to Know in 2025

Penetration testing standards are structured guidelines that define best practices, methodologies, and procedures for executing security assessments.
Attack Surface vs Attack Vector: Understanding the Difference
Dec 19, 2024 Sprocket Security

Attack Surface vs Attack Vector: Understanding the Difference

Penetration testing, or pentesting, simulates an attack on a system to evaluate its defenses. Vulnerability testing identifies and evaluates system security weaknesses.
Ahead of the Breach - Lorenzo Pedroncelli, Senior Manager at RSA Security
Dec 18, 2024 Sprocket Security

Ahead of the Breach - Lorenzo Pedroncelli, Senior Manager at RSA Security

Ahead of the Breach Podcast sits down with Lorenzo Pedroncelli, Senior Manager at RSA Security, to discuss his thoughts on identity security as a cornerstone of cybersecurity.
Pentest Reports: Traditional Reporting vs. Continuous Pentesting
Dec 13, 2024 Sprocket Security

Pentest Reports: Traditional Reporting vs. Continuous Pentesting

Vulnerability scanning as a service is a solution that uses cloud-based tools to identify vulnerabilities in an organization's digital infrastructure.
Application Security Testing (AST): Technologies and Best Practices
Nov 27, 2024 Sprocket Security

Application Security Testing (AST): Technologies and Best Practices

Application security testing involves analyzing and evaluating software applications to identify vulnerabilities.
« 1 2 3 4 5 »