Cybersecurity Resources

Cybersecurity

Latest Cybersecurity Resources

Artificial Intelligence in Cyber Security
Jul 07, 2023 Sprocket Security

Artificial Intelligence in Cyber Security

AI will almost certainly become a central part of the SOC of the future. However, it’s important to ensure that this AI is well-trained and to address the potential for attacks specifically targeting these AI systems.
Traditional vs. Continuous Pentesting: A Comparison Checklist
Oct 07, 2021 Sprocket Security

Traditional vs. Continuous Pentesting: A Comparison Checklist

We get a lot of questions about what makes continuous penetration testing more valuable than traditional timebox testing. Seriously, A LOT of questions – all of which are warranted. Take a look below, and we’re pretty sure you’ll see the benefits when the two methods are stacked side-by-side.
CPT in the wild: 3 real-world examples that prove its value
Sep 09, 2021 Sprocket Security

CPT in the wild: 3 real-world examples that prove its value

We get it, regular ol’ once-a-year penetration testing is the norm. It’s what your company has budgeted for, what you’re IT team is used to, and in many cases, what your expected to do. But that doesn’t mean it’s the best way to protect your network. Think about this: Why would you test your network security from emerging cyber-security threats only...
Fourteen good reasons to require 14-character passwords
Jun 15, 2021 Sprocket Security

Fourteen good reasons to require 14-character passwords

Password. Password123. Yea, you’ve seen them all when it comes to bad passwords. It comes standard when managing IT security. But while your organization likely requires special characters, uppercase letters and even a number or two, if you don’t require longer passwords you’re not taking one of the most important steps to protect your network.
What Is an Attack Surface... and Why Protect It?
May 03, 2021 Nicholas Anastasi

What Is an Attack Surface... and Why Protect It?

Maybe you’ve heard your IT security team talking about attack surfaces? Or, maybe the term has come up during a virtual conference or in your newsfeed. It’s important to take a step back and understand what an attack surface is and why you need to protect it.
Bug Bounty vs. Continuous Pen Testing: Understanding the Basics
Dec 10, 2020 Nicholas Anastasi

Bug Bounty vs. Continuous Pen Testing: Understanding the Basics

Oh, the world of good ol’ bug-bounty programs. In recent months they’ve become a hot topic for IT teams looking to unearth vulnerabilities. And it’s easy to see why. They’re flashy and promise the world. Your company gets notified when a vulnerability is detected. The bounty hunter gets paid for the finding. Everybody leaves happy. Well, not really. Here’s why
1 2 3 4 »