All Resources

Library

Explore our collection of resources, including blog articles, webcasts, case studies, and eBooks.

All Resources

A SANS First Look: Continuous Penetration Testing
Sep 16, 2025

A SANS First Look: Continuous Penetration Testing

A SANS First Look report on Sprocket Security’s continuous penetration testing, showing how it closes gaps left by point-in-time tests through continuous asset discovery, expert validation, and red-blue team collaboration.
Ahead of the Breach -Sprinklr's Roger Allen on Why Vendor Telemetry Only Gets You 90% There
Sep 09, 2025

Ahead of the Breach -Sprinklr's Roger Allen on Why Vendor Telemetry Only Gets You 90% There

Most security programs fail because they focus only on reactive detection while sidelining proactive measures. Roger Allen, Sr. Director, Global Head of Detection & Response at Sprinklr, explains why vendor telemetry gets you 90% of the way there.
Why is Continuous Pentesting a Must for Dynamic Environments?
Sep 02, 2025

Why is Continuous Pentesting a Must for Dynamic Environments?

In today's episode, Casey addresses why continuous pentesting is a must for dynamic environments.
Aug 28, 2025

Gear Up with Sprocket: Activity Feed

Stay aware of attacker activity with Sprocket’s Activity Feed. Get real-time updates, context, and faster response time from CPT.
Ahead of the Breach - Andrew Grealy, Head of Armis Labs
Aug 26, 2025

Ahead of the Breach - Andrew Grealy, Head of Armis Labs

What if you could predict which vulnerabilities threat actors will weaponize months before CISA adds them to their Known Exploited Vulnerabilities list? Andrew Grealy, Head of Armis Labs, has built exactly that capability, providing organizations with threat intelligence that arrives 3-12 months ahead of traditional indicators.
Pentesters Chat - How Attackers Actually Bypass Security Tools
Aug 22, 2025

Pentesters Chat - How Attackers Actually Bypass Security Tools

Join Sprocket's Team as they expose real techniques used to bypass security tools and learn what this means for validating security tools before you buy.
1 2 3 4 5 »