VerSprite Blog
VerSprite Blog
Literary Antidotes for Today's Security Snake Oil
Explore the latest insights and stay informed on evolving digital threats
Application Security, Data Privacy & Development of Security Policies
Google Thwarts Employee Phishing Attack
Application Security, Threat & Vulnerability Management
Plain HTTP Websites Labeled “Not Secure”
Application Security, Digital Forensics & Incident Response, Security Governance
Cyber Criminals Target Employees with W-2 Phishing Scam
Application Security, Security Governance
Swimming in the Deep End: Taking a Deeper Look at the Use Cases of JEA
Application Security, Threat Modeling
Risk Centric Threat Models for Internet of Things (IoT) & Medical Devices
Application Security, Information Security Management System (ISMS), Security Governance
SSL/TLS Security – A Simplified, Quick Guide
Application Security, Cloud Security, Information Security Management System (ISMS)
Command Injection in the WD My Cloud NAS
Application Security, Information Security Management System (ISMS), Regulatory Compliance, Security Governance
Anti-Nausea Medicine for LastPass, Password Management FUD
Application Security, Threat Modeling
Why Threat-Free Threat Modeling Doesn’t Work
Application Security, Information Security Management System (ISMS)
Assessing Emerging JavaScript Platforms with Express.js and Node.js – What to Look For
Application Security, Mobile Security Testing, Risk Assessments
Unsafe Application State Restoration (iOS)
Application Security, Data Privacy & Development of Security Policies