Policy and Best Practices

Policy and Best Practices Resources

Policy and Best Practices

Latest Policy and Best Practices Resources

How to Conduct a Security Risk Assessment in 6 Steps
Nov 22, 2024 Sprocket Security

How to Conduct a Security Risk Assessment in 6 Steps

Security risk assessment is a systematic process to evaluate potential threats and vulnerabilities affecting an organization’s critical resources.
Top 8 Penetration Testing Types, Techniques, and Best Practices
Nov 21, 2024 Sprocket Security

Top 8 Penetration Testing Types, Techniques, and Best Practices

Penetration testing is a simulated cyber-attack against a computer system, network, or application to evaluate its security posture.
External Attack Surface Management: 5 Key Capabilities
Nov 14, 2024 Sprocket Security

External Attack Surface Management: 5 Key Capabilities

External attack surface management (EASM) focuses on managing and securing an organization's digital assets exposed to external threats.
7 Types of Web Application Testing and Building a Testing Strategy
Nov 12, 2024 Sprocket Security

7 Types of Web Application Testing and Building a Testing Strategy

Web application testing involves evaluating an application to ensure its functionality, security, and usability meet the required standards before deployment.
Ahead of the Breach - Joe Mariscal, Director of Cybersecurity and Compliance at Ryerson
Nov 07, 2024 Sprocket Security

Ahead of the Breach - Joe Mariscal, Director of Cybersecurity and Compliance at Ryerson

Ahead of the Breach Podcast sits down with Joe Mariscal, Director of Cybersecurity and Compliance at Ryerson, as he shares his journey from the Marines to building a robust cybersecurity program and emphasizes the importance of leadership in preventing burnout among teams.
Ahead of the Breach - Jack Leidecker, CISO at Gong
Sep 24, 2024 Sprocket Security

Ahead of the Breach - Jack Leidecker, CISO at Gong

Ahead of the Breach Podcast sits down with Jack Leidecker, CISO at Gong, to discusses the importance of proactive cybersecurity measures and building effective security programs from scratch.
« 1 2 3 4 5 »