Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

Ahead of the Breach - Phillip Wylie, Penetration Tester & Podcast Host at The Phillip Wylie Show
Jul 30, 2025 Sprocket Security

Ahead of the Breach - Phillip Wylie, Penetration Tester & Podcast Host at The Phillip Wylie Show

Phillip Wylie, Penetration Tester & Podcast Host of The Phillip Wylie Show, shares why annual penetration testing creates dangerous gaps that threat actors are increasingly exploiting through non-traditional attack vectors like IoT devices.
Ahead of the Breach - What Tools Do You Need for an Offensive Security Stack?
Jul 22, 2025 Sprocket Security

Ahead of the Breach - What Tools Do You Need for an Offensive Security Stack?

In this episode, Casey addresses the tools needed for an offensive security stack.
Ahead of the Breach - Brett Price, Lead Cybersecurity Consultant & vCISO at AccessIT Group
Jul 15, 2025 Sprocket Security

Ahead of the Breach - Brett Price, Lead Cybersecurity Consultant & vCISO at AccessIT Group

Brett Price, Lead Cybersecurity Consultant & vCISO at AccessIT Group, shares his data-first approach to building security programs that actually work.
Ahead of the Breach - What Steps Should You Take to Build a Modern Pentesting Program?
Jul 08, 2025 Sprocket Security

Ahead of the Breach - What Steps Should You Take to Build a Modern Pentesting Program?

In today's episode, Casey addresses 5 steps to building a modern pentesting program.
Ahead of the Breach - Parthasarathi Chakraborty, Former Deputy CISO at Natixis
Jul 01, 2025 Sprocket Security

Ahead of the Breach - Parthasarathi Chakraborty, Former Deputy CISO at Natixis

Parthasarathi Chakraborty, Former Deputy CISO at Natixis CIB, shares his approach to transforming security architecture from theoretical frameworks to measurable business impact.
​​Leveraging Threat Intelligence for Better Attack Surface Management
Jun 26, 2025 Sprocket Security

​​Leveraging Threat Intelligence for Better Attack Surface Management

Most ASM tools just show what's exposed. Add threat intelligence to the mix and you'll finally know which vulnerabilities actually matter. Key insights from our practical guide to actionable ASM.
« 1 2 3 4 5 »