Find the latest Webinar content from the Sprocket Testing Team.
Resources
All Resources

Library

Explore our collection of resources, including blog articles, webcasts, case studies, and eBooks.
Surfacing the Invisible: A Guide to Web Application Attack Surface Management
Dec 05, 2023

Surfacing the Invisible: A Guide to Web Application Attack Surface Management

The top five web application-specific attack surface management opportunities Sprocket Security sees regularly.
Mergers & Acquisitions Risk Management with Continuous Offensive Security
Nov 28, 2023

Mergers & Acquisitions Risk Management with Continuous Offensive Security

Cybersecurity risks are growing exponentially, making a continuous penetration testing solution and risk evaluation necessary during a merger and acquisition transaction.
Lessons Learned: Physical Penetration Testing
Nov 28, 2023

Lessons Learned: Physical Penetration Testing

Watch for an engaging and informative exploration of Physical Penetration Testing (PPT) with Nate Fair, a Penetration Tester at Sprocket Security! In this session, Nate will cover the complexities of PPT, sharing valuable insights, lessons learned, and successful strategies. You'll also gain insight into real-world Physical Penetration Tests that Nate has conducted throughout his career, sharing practical knowledge to help...
What is the Difference Between Vulnerability Scanning and Penetration Testing?
Nov 10, 2023

What is the Difference Between Vulnerability Scanning and Penetration Testing?

In cybersecurity, various tools and strategies are at organizations' disposal to enhance their overall security posture. Among these, two frequently misunderstood strategies are vulnerability scanning and penetration testing. This article delves deep into these two approaches, shedding light on their distinct characteristics and highlighting the key differentiators that set them apart.
Halloween Hack-O-Lantern: Spooky Tales from the Dark Side of Authentication
Oct 31, 2023

Halloween Hack-O-Lantern: Spooky Tales from the Dark Side of Authentication

Uncover the eerie secrets of authentication in our upcoming Webinar, "Halloween Hack-O-Lantern: Spooky Tales from the Dark Side of Authentication." Join us as we explore authentication bypass, from ghostly vishing calls to monstrous CAP bypasses. Don't miss this webinar to learn how to protect your digital fortress from the most cunning hackers.
What is a Security Risk Assessment?
Oct 03, 2023

What is a Security Risk Assessment?

Have you ever wondered how hackable your organization is? A security risk assessment will shine a light on any gaps, vulnerabilities, or regulatory compliance issues in your cyber security defenses.