Find the latest Webinar content from the Sprocket Testing Team.

Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

Social Engineering: 9 Attack Techniques and 6 Defensive Measures
Dec 11, 2024 Sprocket Security

Social Engineering: 9 Attack Techniques and 6 Defensive Measures

Social engineering is a method used to manipulate people into divulging confidential information, enabling unauthorized access, or deploying malware.
Recent InfoSec Talks, Defcon 32 Demo Labs - Farming n-days with GreyNoise
Dec 10, 2024 Will Vandevanter

Recent InfoSec Talks, Defcon 32 Demo Labs - Farming n-days with GreyNoise

In this series the service delivery team writes about an outstanding talk they saw at a conference and implementing those lessons at scale.
Ahead of the Breach - Bindi Davé, Deputy CISO at DigiCert
Dec 03, 2024 Sprocket Security

Ahead of the Breach - Bindi Davé, Deputy CISO at DigiCert

Ahead of the Breach Podcast sits down with Bindi Davé Deputy CISO at DigiCert, to explore the importance of establishing trust in digital communications and the impact of zero trust and AI on security practices.
Red Teaming: History, Methodology, and 4 Critical Best Practices
Dec 03, 2024 Sprocket Security

Red Teaming: History, Methodology, and 4 Critical Best Practices

A “red team” is a group of security experts within an organization, which aims to breach security measures and uncover vulnerabilities, to help the organization improve its defenses.
Application Security Testing (AST): Technologies and Best Practices
Nov 27, 2024 Sprocket Security

Application Security Testing (AST): Technologies and Best Practices

Application security testing involves analyzing and evaluating software applications to identify vulnerabilities.
Top 10 Vulnerability Management Best Practices for 2024
Nov 26, 2024 Sprocket Security

Top 10 Vulnerability Management Best Practices for 2024

Vulnerability management is the ongoing process of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and software
« 5 6 7 8 9 »