All Resources

Library

Explore our collection of resources, including blog articles, webcasts, case studies, and eBooks.

All Resources

How to Choose the Right Pentesting Vendor: A Quick Guide
Sep 18, 2025

How to Choose the Right Pentesting Vendor: A Quick Guide

Find the right pentesting vendor with this quick guide—key tips, questions, and a link to our full Medium resource.
A SANS First Look: Continuous Penetration Testing
Sep 16, 2025

A SANS First Look: Continuous Penetration Testing

A SANS First Look report on Sprocket Security’s continuous penetration testing, showing how it closes gaps left by point-in-time tests through continuous asset discovery, expert validation, and red-blue team collaboration.
How Does Expert-Driven Security Provide Comprehensive Risk Insight?
Sep 16, 2025

How Does Expert-Driven Security Provide Comprehensive Risk Insight?

Traditional security testing gives you snapshots. Expert-driven platforms give you the complete picture. In this tactical episode, Casey explains how the right approach delivers continuous visibility:
Weird Ways to DA
Sep 11, 2025

Weird Ways to DA

Sprocket Security's Director of Technical Operations reveals how Domain Admin access was gained through overlooked misconfigurations and intricate attack paths, with both insight and humor.
Ahead of the Breach -Sprinklr's Roger Allen on Why Vendor Telemetry Only Gets You 90% There
Sep 09, 2025

Ahead of the Breach -Sprinklr's Roger Allen on Why Vendor Telemetry Only Gets You 90% There

Most security programs fail because they focus only on reactive detection while sidelining proactive measures. Roger Allen, Sr. Director, Global Head of Detection & Response at Sprinklr, explains why vendor telemetry gets you 90% of the way there.
Lost in Transliteration: Hidden Passwords in a Multilingual World
Sep 04, 2025

Lost in Transliteration: Hidden Passwords in a Multilingual World

Sprocket Security Senior Penetration Tester examines how transliteration and language backgrounds shape password creation, adding complexity for both users and attackers in his 2025 CypherCon talk.
« 1 2 3 4 5 »