Author
Nick Aures
Explore the author's collection.
Author
Explore the author's collection.
You need more value out of your pentests. The traditional point-in-time testing isn't cutting it. Continuous penetration testing brings an innovative methodology that better protects you and your business. This post… read more →
Nir Rothenberg, CISO/CIO at Rapyd, takes us behind the scenes of Pegasus, one of the most discussed cyber tools in recent history. read more →
A vulnerability assessment identifies and evaluates potential security weaknesses in an organization's systems. read more →
Nir Rothenberg, CISO/CIO at Rapyd, takes us behind the scenes of Pegasus, one of the most discussed cyber tools in recent history. read more →
Sprocket Security CEO Casey Cammilleri gives an inside look into the launch of Sprocket Attack Surface Management tool. read more →
Sean Finley, Director of Application & Product Security at Eptura, shares invaluable insights on building effective application security programs. Learn why flooding backlogs with vulnerabilities isn't the answer and… read more →
We surveyed 200 ethical hackers in our 2024 Voice of an In-House Pentester report. Here's how the state of cybersecurity is impacting organizations' budgets for security going into 2025. read more →
Attack surface monitoring systematically examines and evaluates potential entry points for cyber threats in a system or network. read more →
Explore the new Sprocket Shield Partner Program and its benefits for growth and collaboration in cybersecurity. read more →
Join Microsoft’s Senior Security Researcher Vladimir Tokarev, as he shares how a gaming session led to discovering critical OpenVPN vulnerabilities, and learn his approach to successful vulnerability research through… read more →
PTaaS offers continuous, cloud-based security through simulated cyberattacks, helping organizations identify vulnerabilities in real-time. read more →
The vulnerability management lifecycle is a structured approach to managing potential security weaknesses in information systems. read more →
Continuous Human & Automated Security
Continuously monitor your attack surface with advanced change detection. Upon change, testers and systems perform security testing. You are alerted and assisted in remediation efforts all contained in a single security application, the Sprocket Platform.