Blog

Literary Antidotes for Today’s Security Snake Oil

A Look at RACI Models within Application Threat Modeling

Threat Modeling

A Look at RACI Models within Application Threat Modeling

In this model, you will see engineers, network professionals, developers, architects, business analysts, project managers, security champions, pentesters, and quality assurance engineers. Because they all have some level of involvement and collaboration at different stages of application, as well as organizational, threat modeling ensures effective results.

Learn More

Category

View All
DevSecOps: Your Secret Weapon Against Supply Chain Attacks
DevSecOps, In The News, Supply Chains, Threat & Vulnerability Management

DevSecOps: Your Secret Weapon Against Supply Chain Attacks

How adding security throughout the SDLC using DevS…

Translating Preventative Risk Mitigation to ROI 
Governance Risk & Compliance

Translating Preventative Risk Mitigation to ROI 

Guide to understanding the investment value of pre…

The Rise of AI in Cybersecurity: Expert Insights on the Benefits and Challenges of ChatGPT
News

The Rise of AI in Cybersecurity: Expert Insights on the Benefits and Challenges of ChatGPT

Interview with Tony UV

Grey Box Application Testing: What It Is and Why You Need It
News

Grey Box Application Testing: What It Is and Why You Need It

Grey box pen testing is the best approach to ensur…

VerSprite and AppSecEngineer Partner to Operationalize Security Training
News

VerSprite and AppSecEngineer Partner to Operationalize Security Training

Full-stack, comprehensive, and affordable security…

Nordstream Pipelines Attacks
News

Nordstream Pipelines Attacks

Geopolitical Risk Assessment Russia – Ukraine Co…

Envisions Geopolitical Threat Report:
News

Envisions Geopolitical Threat Report:

Geopolitical Trends Influencing Cybercrime In VerS…

DATA *MIS*MANAGEMENT: ONE OF THE LEADING CAUSES OF SECURITY BREACHES
News

DATA *MIS*MANAGEMENT: ONE OF THE LEADING CAUSES OF SECURITY BREACHES

Steps to take now to ensure data management oversi…

Domain Spoofing and Phishing Attacks
News

Domain Spoofing and Phishing Attacks

Minimize phishing cyberattacks and prevent domain …

AI and Cybersecurity: Threats and Opportunities
News

AI and Cybersecurity: Threats and Opportunities

AI and Machine Learning Tools Are Changing Cyberse…

Welcome to The World of Geopolitics and Cybersecurity!
News

Welcome to The World of Geopolitics and Cybersecurity!

In today’s interconnected global landscape,&nbsp…

Why Bad Guys do Bad Things: How Maslow’s Hierarchy of Needs can help identify cyber threats.
News

Why Bad Guys do Bad Things: How Maslow’s Hierarchy of Needs can help identify cyber threats.

Daniel Stiegman Principal Intelligence Analyst –…

VerSprite CyberWatch. We Dive Into the Latest CyberSecurity News
News

VerSprite CyberWatch. We Dive Into the Latest CyberSecurity News

January 17, 2023Author:  Daniel Stiegman…

Analyzing the State of Cybersecurity at the End of 2022
News

Analyzing the State of Cybersecurity at the End of 2022

Envisions is a leading threat report, produce…

Chrome Exploitation: How to easily launch a Chrome RCE+SBX exploit chain with one command
News

Chrome Exploitation: How to easily launch a Chrome RCE+SBX exploit chain with one command

To teach Chrome exploitation to my team, I’ve se…