All Resources

Library

Explore our collection of resources, including blog articles, webcasts, and case studies.

All Resources

Penetration Testing vs Vulnerability Testing: 6 Key Differences
Dec 18, 2024

Penetration Testing vs Vulnerability Testing: 6 Key Differences

Penetration testing, or pentesting, simulates an attack on a system to evaluate its defenses. Vulnerability testing identifies and evaluates system security weaknesses.
Pentest Reports: Traditional Reporting vs. Continuous Pentesting
Dec 13, 2024

Pentest Reports: Traditional Reporting vs. Continuous Pentesting

Vulnerability scanning as a service is a solution that uses cloud-based tools to identify vulnerabilities in an organization's digital infrastructure.
What Is Vulnerability Scanning as a Service (VSaaS)?
Dec 12, 2024

What Is Vulnerability Scanning as a Service (VSaaS)?

Vulnerability scanning as a service is a solution that uses cloud-based tools to identify vulnerabilities in an organization's digital infrastructure.
Social Engineering: 9 Attack Techniques and 6 Defensive Measures
Dec 11, 2024

Social Engineering: 9 Attack Techniques and 6 Defensive Measures

Social engineering is a method used to manipulate people into divulging confidential information, enabling unauthorized access, or deploying malware.
Recent InfoSec Talks, Defcon 32 Demo Labs - Farming n-days with GreyNoise
Dec 10, 2024

Recent InfoSec Talks, Defcon 32 Demo Labs - Farming n-days with GreyNoise

In this series the service delivery team writes about an outstanding talk they saw at a conference and implementing those lessons at scale.
Pentesters Chat - Breaking into Password Protected Systems
Dec 06, 2024

Pentesters Chat - Breaking into Password Protected Systems

The Sprocket testing team discusses Password Protected Systems.