Sprocket Security

Blog

Stay updated with the latest offensive security news, knowledge, and resources.

Latest Resources

Ahead of the Breach - Joe Mariscal, Director of Cybersecurity and Compliance at Ryerson
Nov 07, 2024 4 min read

Ahead of the Breach - Joe Mariscal, Director of Cybersecurity and Compliance at Ryerson

Ahead of the Breach Podcast sits down with Joe Mariscal, Director of Cybersecurity and Compliance at Ryerson, as he shares his journey from the Marines to building a robust cybersecurity program and emphasizes the importance of leadership in preventing burnout among teams.
READ MORE
Automated Penetration Testing: Process, Pros/Cons and Best Practices
Oct 30, 2024 11 min read

Automated Penetration Testing: Process, Pros/Cons and Best Practices

Automated penetration testing uses specialized software to quickly identify vulnerabilities across networks and applications without manual intervention. Read on to learn about the pros and cons of this pentesting method.
READ MORE
What Is Attack Surface Reduction and 6 Ways to Reduce Yours
Oct 25, 2024 3 min read

What Is Attack Surface Reduction and 6 Ways to Reduce Yours

A company's attack surface naturally grows with the company, but there are still ways to reduce possible entry points for attackers. Learn 6 ways to reduce your attack surface below.
READ MORE
What Is Continuous Threat Exposure Management (CTEM)?
Oct 24, 2024 4 min read

What Is Continuous Threat Exposure Management (CTEM)?

Continuous threat exposure management (CTEM) is a framework for identifying, assessing, and mitigating cybersecurity threats in a dynamic environment. Learn how using CTEM helps your company against threats.
READ MORE
Ahead of the Breach - Konrad Fellmann, VP of IT Infrastructure and CISO at Cubic Corporation
Oct 22, 2024 6 min read

Ahead of the Breach - Konrad Fellmann, VP of IT Infrastructure and CISO at Cubic Corporation

Ahead of the Breach Podcast sits down with Konrad Fellmann, VP of IT Infrastructure and CISO at Cubic Corporation where he discusses proactive strategies for identifying cybersecurity vulnerabilities.
READ MORE
Social Engineering Attacks: Techniques, Prominent Examples, and Prevention
Oct 18, 2024 2 min read

Social Engineering Attacks: Techniques, Prominent Examples, and Prevention

Social engineering is a tactic used by attackers to manipulate individuals into revealing sensitive information or performing actions that compromise security. By exploiting human psychology, such as trust and urgency, rather than system vulnerabilities, social engineers can bypass traditional security measures. Recognizing these deceptive tactics and raising awareness is crucial to prevent data breaches and other damaging outcomes.
READ MORE
« 7 8 9 10 11 »