VerSprite Blog
VerSprite Blog
Literary Antidotes for Today's Security Snake Oil
Explore the latest insights and stay informed on evolving digital threats 
Application Security
Blind Spots in Security Awareness Training Programs

Application Security
A Targeted Vendor Risk Assessment Exposes Vulnerabilities

Application Security, Security Testing
What is Responsible Disclosure?

Application Security, Security Testing
What You Need to Know About Embedded Device Attack Surfaces

Application Security, Threat Modeling
Penetration Testing Methodology: Emulating Realistic Attacks by a Malicious Actor

Application Security, Security Operations
The Software Development Life Cycle & Application Security

Application Security
Phishing Attacks Through Cloned Websites

Application Security
Secure Your Website: Simple HTTPS with Nginx

Application Security, Data Privacy & Development of Security Policies
Attacking LastPass: Compromising an Entire Password Database

Application Security, Threat & Vulnerability Management
Mozilla Firefox Patches Multiple Zero Days

Application Security, Security Research
OH The POSsibilities: Point of Sale System Security

Application Security, Information Security Management System (ISMS)
Attacking Weakly-Configured EAP-TLS Wireless Infrastructures

Application Security, Digital Forensics & Incident Response, Governance Risk & Compliance
Phishing Site Uses Google Translate

Application Security, Threat & Vulnerability Management
Critical Google Chrome Security Issue

Application Security, Threat & Vulnerability Management