Find the latest Webinar content from the Sprocket Testing Team.
Resources
All Resources

Library

Explore our collection of resources, including blog articles, webcasts, case studies, and eBooks.
Ahead of the Breach – Matthew Winters on Threat Hunting, Graph Thinking, and Making Adversaries Cry
Feb 11, 2026

Ahead of the Breach – Matthew Winters on Threat Hunting, Graph Thinking, and Making Adversaries Cry

Matthew Winters of T. Rowe Price joins the pod to discuss how graph thinking changes the way you can investigate threats, mixed in with a nice dose of making life harder for attackers.
Feb 09, 2026

How Continuous Penetration Testing Keeps You Audit-Ready

Annual pen tests leave 345 days of untested exposure. Learn how continuous penetration testing keeps your security posture audit-ready year-round.
The Dangers of Public Registration in Web Apps: How a JWT + oData Leaked Millions of Records
Feb 06, 2026

The Dangers of Public Registration in Web Apps: How a JWT + oData Leaked Millions of Records

Nick Aures guides us through a real-life pentesting moment with important lessons for authentication using industry-standard technology, in this case JWTs.
Gear Up with Sprocket: AWS Scanner
Jan 22, 2026

Gear Up with Sprocket: AWS Scanner

Discover how Sprocket Security’s AWS Scanner continuously maps public cloud assets to keep penetration testing and attack surface management current.
The Cyber Threats That Will Define 2026 (And Why Point-in-Time Testing Keeps Missing Them)
Jan 20, 2026

The Cyber Threats That Will Define 2026 (And Why Point-in-Time Testing Keeps Missing Them)

Security risks for 2026 aren’t new threats. They’re missing exposure. Learn what attackers exploit today and why traditional pentests fall short.
CVE-2024-0692: Building the Exploit That Didn't Exist
Jan 13, 2026

CVE-2024-0692: Building the Exploit That Didn't Exist

A deep technical breakdown of CVE-2024-0692 and how Sprocket Security developed a working exploit for this high-severity SolarWinds SEM deserialization vulnerability, revealing real-world impact beyond scanner findings.
5 6 7 8 9