Author

Sprocket Security

Explore the author's collection.

Resources by Sprocket Security

7-Stage Vulnerability Management Process and How to Make It Great

Penetration testing is a simulated cyber-attack against a computer system, network, or application to evaluate its security posture. read more →

Top 8 Penetration Testing Types, Techniques, and Best Practices

Penetration testing is a simulated cyber-attack against a computer system, network, or application to evaluate its security posture. read more →

Ahead of the Breach - Arif Basha, Cybersecurity Leader

Ahead of the Breach Podcast sits down with Arif Basha, a cybersecurity leader, as he shares his insights on the critical importance of attack surface management in today’s cybersecurity landscape. read more →

External Attack Surface Management: 5 Key Capabilities

External attack surface management (EASM) focuses on managing and securing an organization's digital assets exposed to external threats. read more →

7 Types of Web Application Testing and Building a Testing Strategy

Web application testing involves evaluating an application to ensure its functionality, security, and usability meet the required standards before deployment. read more →

Ahead of the Breach - Joe Mariscal, Director of Cybersecurity and Compliance at Ryerson

Ahead of the Breach Podcast sits down with Joe Mariscal, Director of Cybersecurity and Compliance at Ryerson, as he shares his journey from the Marines to building a robust cybersecurity program and emphasizes the… read more →

Automated Penetration Testing: Process, Pros/Cons and Best Practices

Automated penetration testing uses specialized software to quickly identify vulnerabilities across networks and applications without manual intervention. Read on to learn about the pros and cons of this pentesting… read more →

What Is Attack Surface Reduction and 6 Ways to Reduce Yours

A company's attack surface naturally grows with the company, but there are still ways to reduce possible entry points for attackers. Learn 6 ways to reduce your attack surface below. read more →

What Is Continuous Threat Exposure Management (CTEM)?

Continuous threat exposure management (CTEM) is a framework for identifying, assessing, and mitigating cybersecurity threats in a dynamic environment. Learn how using CTEM helps your company against threats. read more →

Ahead of the Breach - Konrad Fellmann, VP of IT Infrastructure and CISO at Cubic Corporation

Ahead of the Breach Podcast sits down with Konrad Fellmann, VP of IT Infrastructure and CISO at Cubic Corporation where he discusses proactive strategies for identifying cybersecurity vulnerabilities. read more →

Social Engineering Attacks: Techniques, Prominent Examples, and Prevention

Social engineering is a tactic used by attackers to manipulate individuals into revealing sensitive information or performing actions that compromise security. By exploiting human psychology, such as trust and urgency,… read more →

We Surveyed 200 In-House Pentesters; Here’s a Sample of What We Learned

We’ve just released our latest report, “Voice of an In-House Pentester,” diving deep into the world of penetration testing. With insights from 200 in-house security practitioners, this report reveals key trends,… read more →

Continuous Human & Automated Security

The Expert-Driven Offensive
Security Platform

Continuously monitor your attack surface with advanced change detection. Upon change, testers and systems perform security testing. You are alerted and assisted in remediation efforts all contained in a single security application, the Sprocket Platform.

Watch Demo Request Quote

Expert-Driven Offensive Security Platform

  • Attack Surface Management
  • Continuous Penetration Testing
  • Adversary Simulations