Blogs

Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

Ahead of the Breach - DK Koran, BISO at NerdWallet
Feb 25, 2025 Sprocket Security

Ahead of the Breach - DK Koran, BISO at NerdWallet

DK Koran, BISO at NerdWallet, brings this episode of Ahead of the Breach unique insights from his extensive background testing critical infrastructure to his role leading application security.
Ahead of the Breach - Nir Rothenberg, CISO/CIO, Rapyd
Feb 13, 2025 Sprocket Security

Ahead of the Breach - Nir Rothenberg, CISO/CIO, Rapyd

Nir Rothenberg, CISO/CIO at Rapyd, takes us behind the scenes of Pegasus, one of the most discussed cyber tools in recent history.
Insider Secrets: Attack Surface Management Tool from a Hacker’s Perspective
Feb 11, 2025 Casey Cammilleri

Insider Secrets: Attack Surface Management Tool from a Hacker’s Perspective

Sprocket Security CEO Casey Cammilleri gives an inside look into the launch of Sprocket Attack Surface Management tool.
Ahead of the Breach - Sean Finley, Director of Application & Product Security, Eptura
Jan 28, 2025 Sprocket Security

Ahead of the Breach - Sean Finley, Director of Application & Product Security, Eptura

Sean Finley, Director of Application & Product Security at Eptura, shares invaluable insights on building effective application security programs. Learn why flooding backlogs with vulnerabilities isn't the answer and discover how to create security processes that truly serve business goals while managing risk effectively.
Why Organizations Are Raising Their Testing Budgets for 2025
Jan 27, 2025 Lindsay Drozdik

Why Organizations Are Raising Their Testing Budgets for 2025

We surveyed 200 ethical hackers in our 2024 Voice of an In-House Pentester report. Here's how the state of cybersecurity is impacting organizations' budgets for security going into 2025.
Attack Surface Monitoring: Core Functions, Challenges and Best Practices
Jan 21, 2025 Sprocket Security

Attack Surface Monitoring: Core Functions, Challenges and Best Practices

Attack surface monitoring systematically examines and evaluates potential entry points for cyber threats in a system or network.
« 2 3 4 5 6 »