All Resources

Library

Explore our collection of resources, including blog articles, webcasts, and case studies.

All Resources

Ahead of the Breach - Sean Finley, Director of Application & Product Security, Eptura
Jan 28, 2025

Ahead of the Breach - Sean Finley, Director of Application & Product Security, Eptura

Sean Finley, Director of Application & Product Security at Eptura, shares invaluable insights on building effective application security programs. Learn why flooding backlogs with vulnerabilities isn't the answer and discover how to create security processes that truly serve business goals while managing risk effectively.
Why Organizations Are Raising Their Testing Budgets for 2025
Jan 27, 2025

Why Organizations Are Raising Their Testing Budgets for 2025

We surveyed 200 ethical hackers in our 2024 Voice of an In-House Pentester report. Here's how the state of cybersecurity is impacting organizations' budgets for security going into 2025.
Attack Surface Monitoring: Core Functions, Challenges and Best Practices
Jan 21, 2025

Attack Surface Monitoring: Core Functions, Challenges and Best Practices

Attack surface monitoring systematically examines and evaluates potential entry points for cyber threats in a system or network.
Beginning a New Chapter: The Sprocket Shield Partner Program
Jan 17, 2025

Beginning a New Chapter: The Sprocket Shield Partner Program

Explore the new Sprocket Shield Partner Program and its benefits for growth and collaboration in cybersecurity.
Ahead of the Breach - Vladimir Tokarev, Senior Security Researcher, Microsoft
Jan 14, 2025

Ahead of the Breach - Vladimir Tokarev, Senior Security Researcher, Microsoft

Join Microsoft’s Senior Security Researcher Vladimir Tokarev, as he shares how a gaming session led to discovering critical OpenVPN vulnerabilities, and learn his approach to successful vulnerability research through curiosity and persistence.
Penetration Testing as a Service: Pros/Cons and Choosing a Provider
Jan 10, 2025

Penetration Testing as a Service: Pros/Cons and Choosing a Provider

PTaaS offers continuous, cloud-based security through simulated cyberattacks, helping organizations identify vulnerabilities in real-time.
« 5 6 7 8 9 »