Offensive Security Resources

Offensive Security

Latest Offensive Security Resources

Ahead of the Breach - Cody Florek, Director of Information Security Operations at Sentry
May 06, 2025 Sprocket Security

Ahead of the Breach - Cody Florek, Director of Information Security Operations at Sentry

Cody explains why context is critical — a vulnerability on an isolated batch server requires different attention than one affecting your entire infrastructure.
Ahead of the Breach - Ayyappan Rajesh, Offensive Security Engineer at Block Harbor
Apr 22, 2025 Sprocket Security

Ahead of the Breach - Ayyappan Rajesh, Offensive Security Engineer at Block Harbor

Ayyappan Rajesh, Offensive Security Engineer at Block Harbor Cybersecurity, takes Casey deep into the technical underbelly of wireless security testing in this illuminating episode of Ahead of the Breach.
Ahead of the Breach - Eyal Paz, VP of Research at OX Security
Apr 09, 2025 Sprocket Security

Ahead of the Breach - Eyal Paz, VP of Research at OX Security

Introducing security into development pipelines is walking a tightrope — one false step can turn developers against your security program.
Ahead of the Breach - Joshua Brown, Founder of Digital Defense Consulting
Mar 25, 2025 Sprocket Security

Ahead of the Breach - Joshua Brown, Founder of Digital Defense Consulting

Dive deep into why security leaders must abandon technical jargon for financial impact metrics when speaking to executives.
Ahead of the Breach - Donika Mirdita, Security Researcher at Fraunhofer Institute for Secure Information Technology
Mar 12, 2025 Sprocket Security

Ahead of the Breach - Donika Mirdita, Security Researcher at Fraunhofer Institute for Secure Information Techno...

Explore how fixed query patterns and short manifest lifecycles combine to undermine Internet routing security.
Moving from Snapshots to Strategy: Why CTEM is Essential for Security Leaders
Mar 04, 2025 Greg Anderson

Moving from Snapshots to Strategy: Why CTEM is Essential for Security Leaders

Discover why Continuous Threat Exposure Management (CTEM) is crucial for security leaders. Learn how moving to real-time threat management can enhance your organization's cybersecurity resilience.
« 1 2 3 4 5 »