Find the latest Webinar content from the Sprocket Testing Team.

Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

We Surveyed 200 In-House Pentesters; Here’s a Sample of What We Learned
Oct 15, 2024 5 min read

We Surveyed 200 In-House Pentesters; Here’s a Sample of What We Learned

We’ve just released our latest report, “Voice of an In-House Pentester,” diving deep into the world of penetration testing. With insights from 200 in-house security practitioners, this report reveals key trends, challenges, and opportunities in the industry.
READ MORE
Red Team vs Blue Team: Roles, Skills, Tools, and Tips
Oct 09, 2024 4 min read

Red Team vs Blue Team: Roles, Skills, Tools, and Tips

Red and Blue Teams play critical roles in the ever-evolving field of cybersecurity. Red Teams simulate real-world attacks, testing an organization’s defenses by identifying vulnerabilities and potential entry points. Blue Teams, on the other hand, focus on defensive strategies, monitoring systems, detecting threats, and responding to incidents. Together, their collaboration enhances an organization’s ability to detect, prevent, and mitigate cyber...
READ MORE
Ahead of the Breach - Al Imran Husain, CISO & VP of Global Infrastructure
Oct 08, 2024 6 min read

Ahead of the Breach - Al Imran Husain, CISO & VP of Global Infrastructure

Ahead of the Breach Podcast sits down with Al Imran Husain, CISO & VP of Global Infrastructure where he shares his insights on the unique challenges faced by the industry, particularly the convergence of IT and OT systems.
READ MORE
Attack Surface Management: Key Functions, Tools, and Best Practices
Oct 02, 2024 15 min read

Attack Surface Management: Key Functions, Tools, and Best Practices

As organizations grow and adopt new technologies, their attack surface expands, creating more opportunities for cyber threats. Attack Surface Management (ASM) is crucial for identifying and securing both digital and physical entry points that could be exploited. This article explores the key functions of ASM, including asset discovery, vulnerability analysis, and continuous monitoring, while highlighting best practices for maintaining a...
READ MORE
Large Language Model (LLM) Security Testing: Types, Techniques, and Methodology
Oct 01, 2024 6 min read

Large Language Model (LLM) Security Testing: Types, Techniques, and Methodology

Get ready to learn the importance of LLM (Large Language Model) security testing, a vital process for identifying vulnerabilities in AI models, especially those integrated into web applications. The need for early detection of potential risks like unauthorized data access, prompt injection attacks, and remote code execution is more crucial than ever.
READ MORE
Social Engineering Penetration Testing: A Practical Guide
Sep 27, 2024 4 min read

Social Engineering Penetration Testing: A Practical Guide

Social engineering penetration testing evaluates how susceptible an organization is to deception-based attacks targeting human vulnerabilities rather than technical systems. By simulating real-world social engineering tactics like phishing, pretexting, and physical infiltration, it assesses how well employees can detect and respond to such threats. This testing highlights the need for improved security training and protocols to protect sensitive information from...
READ MORE
« 8 9 10 11 12 »