Blog
Literary Antidotes for Today's Security Snake Oil
Threat Modeling
A Look at RACI Models within Application Threat Modeling
In this model, you will see engineers, network professionals, developers, architects, business analysts, project managers, security champions, pentesters, and quality assurance engineers. Because they all have some level of involvement and collaboration at different stages of application, as well as organizational, threat modeling ensures effective results.
Learn MoreQUALITY – INDUSTRY STANDARDS – TRUST
At VerSprite, we are dedicated to providing qualit...
Attacking Your Assumptions: How Criminal Tactics Can Save Your Organization
In this article, VerSprite's Offensive Security te...
Penetration Testing Standards – a Viral Topic at RSAC 2022
Penetration Testing, frequent misrepresentation of...
Pentester Answers Which Penetration Test is Right for Your Business
What is penetration testing and which security tes...
How to Intercept TLS Traffic with ALPN Support
VerSprite's Offensive Security team releases new, ...
NordVPN’s Strategic Cybersecurity Partnership with VerSprite
After facing a cybersecurity incident with third-p...
How Secure Are Your Universally Unique IDentifiers (UUIDs)?
Universally Unique IDentifiers, also known as UUID...
MiTM Attack Between Target Windows Machines and a DNS Server
When performing this attack, we will find two diff...