All Resources

Library

Explore our collection of resources, including blog articles, webcasts, and case studies.

All Resources

Top 8 Penetration Testing Types, Techniques, and Best Practices
Nov 21, 2024

Top 8 Penetration Testing Types, Techniques, and Best Practices

Penetration testing is a simulated cyber-attack against a computer system, network, or application to evaluate its security posture.
Ahead of the Breach - Arif Basha, Cybersecurity Leader
Nov 19, 2024

Ahead of the Breach - Arif Basha, Cybersecurity Leader

Ahead of the Breach Podcast sits down with Arif Basha, a cybersecurity leader, as he shares his insights on the critical importance of attack surface management in today’s cybersecurity landscape.
External Attack Surface Management: 5 Key Capabilities
Nov 14, 2024

External Attack Surface Management: 5 Key Capabilities

External attack surface management (EASM) focuses on managing and securing an organization's digital assets exposed to external threats.
7 Types of Web Application Testing and Building a Testing Strategy
Nov 12, 2024

7 Types of Web Application Testing and Building a Testing Strategy

Web application testing involves evaluating an application to ensure its functionality, security, and usability meet the required standards before deployment.
Ahead of the Breach - Joe Mariscal, Director of Cybersecurity and Compliance at Ryerson
Nov 07, 2024

Ahead of the Breach - Joe Mariscal, Director of Cybersecurity and Compliance at Ryerson

Ahead of the Breach Podcast sits down with Joe Mariscal, Director of Cybersecurity and Compliance at Ryerson, as he shares his journey from the Marines to building a robust cybersecurity program and emphasizes the importance of leadership in preventing burnout among teams.
Pentesters Chat - Breaking into AI and Machine Learning Systems
Nov 04, 2024

Pentesters Chat - Breaking into AI and Machine Learning Systems

The Sprocket testing team discusses AI and Machine Learning Systems.