Find the latest Webinar content from the Sprocket Testing Team.

Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

Beginning a New Chapter: The Sprocket Shield Partner Program
Jan 17, 2025 Jon Peppler

Beginning a New Chapter: The Sprocket Shield Partner Program

Explore the new Sprocket Shield Partner Program and its benefits for growth and collaboration in cybersecurity.
Ahead of the Breach - Vladimir Tokarev, Senior Security Researcher, Microsoft
Jan 14, 2025 Sprocket Security

Ahead of the Breach - Vladimir Tokarev, Senior Security Researcher, Microsoft

Join Microsoft’s Senior Security Researcher Vladimir Tokarev, as he shares how a gaming session led to discovering critical OpenVPN vulnerabilities, and learn his approach to successful vulnerability research through curiosity and persistence.
Penetration Testing as a Service: Pros/Cons and Choosing a Provider
Jan 10, 2025 Sprocket Security

Penetration Testing as a Service: Pros/Cons and Choosing a Provider

PTaaS offers continuous, cloud-based security through simulated cyberattacks, helping organizations identify vulnerabilities in real-time.
6 Stages of the Vulnerability Management Lifecycle
Jan 08, 2025 Sprocket Security

6 Stages of the Vulnerability Management Lifecycle

The vulnerability management lifecycle is a structured approach to managing potential security weaknesses in information systems.
Ahead of the Breach - Kieran Smith, Lead Pentest Engineer, N-able
Jan 07, 2025 Sprocket Security

Ahead of the Breach - Kieran Smith, Lead Pentest Engineer, N-able

Join Keiran Smith, Lead Pentest Engineer at N-able, as he shares his journey from teenage hacker to security leader, discussing the intersection of development and security testing, and providing insights for aspiring pentesters.
5 Penetration Testing Standards to Know in 2025
Jan 02, 2025 Sprocket Security

5 Penetration Testing Standards to Know in 2025

Penetration testing standards are structured guidelines that define best practices, methodologies, and procedures for executing security assessments.
« 3 4 5 6 7 »