All Resources

Library

Explore our collection of resources, including blog articles, webcasts, and case studies.

All Resources

​​Leveraging Threat Intelligence for Better Attack Surface Management
Jun 26, 2025

​​Leveraging Threat Intelligence for Better Attack Surface Management

Most ASM tools just show what's exposed. Add threat intelligence to the mix and you'll finally know which vulnerabilities actually matter. Key insights from our practical guide to actionable ASM.
Pentesters Chat - Hacker Summer Camp 2025
Jun 24, 2025

Pentesters Chat - Hacker Summer Camp 2025

Black Hat and DEFCON (affectionately dubbed Hacker Summer Camp) is right around the corner! Join us as "hackers" everywhere gear up for one of the most anticipated events of the year.
Ahead of the Breach - What Are the Common Myths About Continuous Pentesting?
Jun 24, 2025

Ahead of the Breach - What Are the Common Myths About Continuous Pentesting?

Software Is Alive. Your Security Strategy Should Be, Too.
Jun 19, 2025

Software Is Alive. Your Security Strategy Should Be, Too.

The software industry is a living, breathing thing. Shouldn’t you have living, breathing security to go alongside that?
Ahead of the Breach - Tim Silverline, VP of Security at Rocket Lawyer
Jun 17, 2025

Ahead of the Breach - Tim Silverline, VP of Security at Rocket Lawyer

In his chat with Casey, recorded at RSA 2025, Tim shares hard-earned insights about building effective security programs in established organizations while navigating the complexities of rapid AI development and multi-compliance requirements.
CVE ALERT (CVE-2025-44043 & CVE-2025-44044) - The Search Bar Hacks Aren't Dead Yet
Jun 10, 2025

CVE ALERT (CVE-2025-44043 & CVE-2025-44044) - The Search Bar Hacks Aren't Dead Yet

Explore how Sprocket Security uncovered chained vulnerabilities and learn how overlooked parameters led to serious security risks.
1 2 3 4 5 »