VerSprite Blog
VerSprite Blog
Literary Antidotes for Today's Security Snake Oil
Explore the latest insights and stay informed on evolving digital threats ![TLS 1.3 and Major TLS Libraries Vulnerable](https://versprite.com/wp-content/uploads/2019/03/TLS-1.3-and-Major-TLS-Libraries-Vulnerable-1024x576.png)
Application Security, Security Training
TLS 1.3 and Major TLS Libraries Vulnerable
![VerSprite Earns CREST Certification](https://versprite.com/wp-content/uploads/2019/02/CREST-accredited-1024x576.png)
Application Security, Information Security Management System (ISMS)
VerSprite Earns CREST Certification
![MiTM Attack Between Target Windows Machines and a DNS Server](https://versprite.com/wp-content/uploads/2019/01/MiTM-DNS-Spoofing-1024x576.png)
Application Security, Penetration Testing
MiTM Attack Between Target Windows Machines and a DNS Server
![How Hackers Can Attack Your Amazon Web Services (AWS) Resources](https://versprite.com/wp-content/uploads/2018/12/securing-AWS-resources-1024x576.png)
Application Security, Cloud Security, Security Operations, Security Testing
How Hackers Can Attack Your Amazon Web Services (AWS) Resources
![Google Thwarts Employee Phishing Attack](https://versprite.com/wp-content/uploads/2018/10/Google-Phishing-Attack-1024x576.png)
Application Security, Data Privacy & Development of Security Policies
Google Thwarts Employee Phishing Attack
![Plain HTTP Websites Labeled “Not Secure”](https://versprite.com/wp-content/uploads/2018/09/HTTP-Labeled-Not-Secure-1024x576.png)
Application Security, Threat & Vulnerability Management
Plain HTTP Websites Labeled “Not Secure”
![Cyber Criminals Target Employees with W-2 Phishing Scam](https://versprite.com/wp-content/uploads/2018/02/W-2-Phishing-Scam-1024x576.png)
Application Security, Digital Forensics & Incident Response, Governance Risk & Compliance
Cyber Criminals Target Employees with W-2 Phishing Scam
![Swimming in the Deep End: Taking a Deeper Look at the Use Cases of JEA](https://versprite.com/wp-content/uploads/2017/10/Use-Cases-of-JEA-1024x576.png)
Application Security, Governance Risk & Compliance
Swimming in the Deep End: Taking a Deeper Look at the Use Cases of JEA
![Risk Centric Threat Models for Internet of Things (IoT) & Medical Devices](https://versprite.com/wp-content/uploads/2017/09/iot-based-medical-devices-1024x576.png)
Application Security, Threat Modeling
Risk Centric Threat Models for Internet of Things (IoT) & Medical Devices
![SSL/TLS Security – A Simplified, Quick Guide](https://versprite.com/wp-content/uploads/2017/05/SSLTLS-Security-1024x576.png)
Application Security, Governance Risk & Compliance, Information Security Management System (ISMS)
SSL/TLS Security – A Simplified, Quick Guide
![Command Injection in the WD My Cloud NAS](https://versprite.com/wp-content/uploads/2015/09/WD-My-Cloud-1024x576.png)
Application Security, Cloud Security, Information Security Management System (ISMS)
Command Injection in the WD My Cloud NAS
![Anti-Nausea Medicine for LastPass, Password Management FUD](https://versprite.com/wp-content/uploads/2015/06/password-management-1024x576.png)
Application Security, Governance Risk & Compliance, Information Security Management System (ISMS), Regulatory Compliance
Anti-Nausea Medicine for LastPass, Password Management FUD
![Why Threat-Free Threat Modeling Doesn’t Work](https://versprite.com/wp-content/uploads/2015/05/threat-free-threat-modeling-1024x576.png)
Application Security, Threat Modeling
Why Threat-Free Threat Modeling Doesn’t Work
![Assessing Emerging JavaScript Platforms with Express.js and Node.js – What to Look For](https://versprite.com/wp-content/uploads/2015/04/Node.js-1024x576.png)
Application Security, Information Security Management System (ISMS)
Assessing Emerging JavaScript Platforms with Express.js and Node.js – What to Look For
![Unsafe Application State Restoration (iOS)](https://versprite.com/wp-content/uploads/2014/06/unsafe-application-state-restoration-1024x576.png)
Application Security, Mobile Security Testing, Risk Assessments