VerSprite Blog
VerSprite Blog
Literary Antidotes for Today's Security Snake Oil
Explore the latest insights and stay informed on evolving digital threats 
Application Security, Security Training
TLS 1.3 and Major TLS Libraries Vulnerable

Application Security, Information Security Management System (ISMS)
VerSprite Earns CREST Certification

Application Security, Penetration Testing
MiTM Attack Between Target Windows Machines and a DNS Server

Application Security, Cloud Security, Security Operations, Security Testing
How Hackers Can Attack Your Amazon Web Services (AWS) Resources

Application Security, Data Privacy & Development of Security Policies
Google Thwarts Employee Phishing Attack

Application Security, Threat & Vulnerability Management
Plain HTTP Websites Labeled “Not Secure”

Application Security, Digital Forensics & Incident Response, Governance Risk & Compliance
Cyber Criminals Target Employees with W-2 Phishing Scam

Application Security, Governance Risk & Compliance
Swimming in the Deep End: Taking a Deeper Look at the Use Cases of JEA

Application Security, Threat Modeling
Risk Centric Threat Models for Internet of Things (IoT) & Medical Devices

Application Security, Governance Risk & Compliance, Information Security Management System (ISMS)
SSL/TLS Security – A Simplified, Quick Guide

Application Security, Cloud Security, Information Security Management System (ISMS)
Command Injection in the WD My Cloud NAS

Application Security, Governance Risk & Compliance, Information Security Management System (ISMS), Regulatory Compliance
Anti-Nausea Medicine for LastPass, Password Management FUD

Application Security, Threat Modeling
Why Threat-Free Threat Modeling Doesn’t Work

Application Security, Information Security Management System (ISMS)
Assessing Emerging JavaScript Platforms with Express.js and Node.js – What to Look For

Application Security, Mobile Security Testing, Risk Assessments