Sprocket Security

Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

Recent InfoSec Talks, Defcon 32 Demo Labs - Farming n-days with GreyNoise
Dec 10, 2024 3 min read

Recent InfoSec Talks, Defcon 32 Demo Labs - Farming n-days with GreyNoise

In this series the service delivery team writes about an outstanding talk they saw at a conference and implementing those lessons at scale.
READ MORE
Ahead of the Breach - Bindi Davé, Deputy CISO at DigiCert
Dec 03, 2024 4 min read

Ahead of the Breach - Bindi Davé, Deputy CISO at DigiCert

Ahead of the Breach Podcast sits down with Bindi Davé Deputy CISO at DigiCert, to explore the importance of establishing trust in digital communications and the impact of zero trust and AI on security practices.
READ MORE
Red Teaming: History, Methodology, and 4 Critical Best Practices
Dec 03, 2024 3 min read

Red Teaming: History, Methodology, and 4 Critical Best Practices

A “red team” is a group of security experts within an organization, which aims to breach security measures and uncover vulnerabilities, to help the organization improve its defenses.
READ MORE
Application Security Testing (AST): Technologies and Best Practices
Nov 27, 2024 6 min read

Application Security Testing (AST): Technologies and Best Practices

Application security testing involves analyzing and evaluating software applications to identify vulnerabilities.
READ MORE
Top 10 Vulnerability Management Best Practices for 2024
Nov 26, 2024 8 min read

Top 10 Vulnerability Management Best Practices for 2024

Vulnerability management is the ongoing process of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and software
READ MORE
How to Conduct a Security Risk Assessment in 6 Steps
Nov 22, 2024 4 min read

How to Conduct a Security Risk Assessment in 6 Steps

Security risk assessment is a systematic process to evaluate potential threats and vulnerabilities affecting an organization’s critical resources.
READ MORE
« 5 6 7 8 9 »