Find the latest Webinar content from the Sprocket Testing Team.

Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

Ahead of the Breach - Konrad Fellmann, VP of IT Infrastructure and CISO at Cubic Corporation
Oct 22, 2024 Sprocket Security

Ahead of the Breach - Konrad Fellmann, VP of IT Infrastructure and CISO at Cubic Corporation

Ahead of the Breach Podcast sits down with Konrad Fellmann, VP of IT Infrastructure and CISO at Cubic Corporation where he discusses proactive strategies for identifying cybersecurity vulnerabilities.
Social Engineering Attacks: Techniques, Prominent Examples, and Prevention
Oct 18, 2024 Sprocket Security

Social Engineering Attacks: Techniques, Prominent Examples, and Prevention

Social engineering is a tactic used by attackers to manipulate individuals into revealing sensitive information or performing actions that compromise security. By exploiting human psychology, such as trust and urgency, rather than system vulnerabilities, social engineers can bypass traditional security measures. Recognizing these deceptive tactics and raising awareness is crucial to prevent data breaches and other damaging outcomes.
We Surveyed 200 In-House Pentesters; Here’s a Sample of What We Learned
Oct 15, 2024 Sprocket Security

We Surveyed 200 In-House Pentesters; Here’s a Sample of What We Learned

We’ve just released our latest report, “Voice of an In-House Pentester,” diving deep into the world of penetration testing. With insights from 200 in-house security practitioners, this report reveals key trends, challenges, and opportunities in the industry.
Red Team vs Blue Team: Roles, Skills, Tools, and Tips
Oct 09, 2024 Sprocket Security

Red Team vs Blue Team: Roles, Skills, Tools, and Tips

Red and Blue Teams play critical roles in the ever-evolving field of cybersecurity. Red Teams simulate real-world attacks, testing an organization’s defenses by identifying vulnerabilities and potential entry points. Blue Teams, on the other hand, focus on defensive strategies, monitoring systems, detecting threats, and responding to incidents. Together, their collaboration enhances an organization’s ability to detect, prevent, and mitigate cyber...
Ahead of the Breach - Al Imran Husain, CISO & VP of Global Infrastructure
Oct 08, 2024 Sprocket Security

Ahead of the Breach - Al Imran Husain, CISO & VP of Global Infrastructure

Ahead of the Breach Podcast sits down with Al Imran Husain, CISO & VP of Global Infrastructure where he shares his insights on the unique challenges faced by the industry, particularly the convergence of IT and OT systems.
Attack Surface Management: Key Functions, Tools, and Best Practices
Oct 02, 2024 Sprocket Security

Attack Surface Management: Key Functions, Tools, and Best Practices

As organizations grow and adopt new technologies, their attack surface expands, creating more opportunities for cyber threats. Attack Surface Management (ASM) is crucial for identifying and securing both digital and physical entry points that could be exploited. This article explores the key functions of ASM, including asset discovery, vulnerability analysis, and continuous monitoring, while highlighting best practices for maintaining a...
« 8 9 10 11 12 »