Blog

Literary Antidotes for Today's Security Snake Oil

A Look at RACI Models within Application Threat Modeling

Threat Modeling

A Look at RACI Models within Application Threat Modeling

In this model, you will see engineers, network professionals, developers, architects, business analysts, project managers, security champions, pentesters, and quality assurance engineers. Because they all have some level of involvement and collaboration at different stages of application, as well as organizational, threat modeling ensures effective results.

Learn More

Category

View All
Insight Into Critical Threat Report Envisions 2022
Geopolitical Risk, Reports

Insight Into Critical Threat Report Envisions 2022

Each year, VerSprite's dedicated team of cybersecu...

How STIX Cyber Campaigns Provide Intel on Geopolitical and Cybersecurity Risks
Geopolitical Risk, Reports

How STIX Cyber Campaigns Provide Intel on Geopolitical and Cybersecurity Risks

In part two of VerSprite's STIX series, we will di...

US-Iran Conflict: Increased Geopolitical Risk From Cyber Attacks Based Out of Iran
Geopolitical Risk

US-Iran Conflict: Increased Geopolitical Risk From Cyber Attacks Based Out of Iran

The assassination of Soleimani, revered by many Ir...

Utilizing STIX to Foreshadow Cybersecurity Risks
Geopolitical Risk

Utilizing STIX to Foreshadow Cybersecurity Risks

Structured Threat Information eXpression (STIX) is...

10 Data Privacy Tips: Wellness Industry & Growing Data Concerns
Geopolitical Risk, Governance Risk & Compliance

10 Data Privacy Tips: Wellness Industry & Growing Data Concerns

Wellness providers will need to consider data priv...

Why Healthcare is an Attractive Target for Malicious Actors
Data Privacy & Development of Security Policies, Geopolitical Risk, Regulatory Compliance

Why Healthcare is an Attractive Target for Malicious Actors

The global healthcare sector suffers more breaches...

Growing Intersection of Geopolitics and Cybersecurity
Geopolitical Risk

Growing Intersection of Geopolitics and Cybersecurity

Verizon’s 2019 Data Breach Investigations Report...

Gig Economy & Growing Security Gaps
Data Privacy & Development of Security Policies, Geopolitical Risk, Governance Risk & Compliance

Gig Economy & Growing Security Gaps

As the gig economy, and the use of temporary or on...

Interactive Simulations: Risk Management That Is Greater Than the Sum of Its Parts
Geopolitical Risk, Information Security Management System (ISMS)

Interactive Simulations: Risk Management That Is Greater Than the Sum of Its Parts

The session demonstrated how companies can use dat...

Podcast: Cyber-Geopolitics and the Role of Data
Geopolitical Risk

Podcast: Cyber-Geopolitics and the Role of Data

In Data Driven’s latest podcast episode, Geopoli...

Disappearing Dissidents – Powered by Tech
Geopolitical Risk

Disappearing Dissidents – Powered by Tech

In a year characterized by dramatic geopolitical c...

The Aadhaar Biometric Database Saga
Geopolitical Risk

The Aadhaar Biometric Database Saga

Aadhaar was developed in 2009 by the Unique Identi...

VerSprite Reacts: No Shortcuts in Cybersecurity
Geopolitical Risk

VerSprite Reacts: No Shortcuts in Cybersecurity

Following recent news reports of substantial data ...

VerSprite Reacts: Aviation Scandal & Corporate Espionage
Data Privacy & Development of Security Policies, Geopolitical Risk

VerSprite Reacts: Aviation Scandal & Corporate Espionage

Corporate espionage is not a new phenomenon, but d...

VerSprite Reacts: Managing Global Risks of Emerging AI Technology
Geopolitical Risk

VerSprite Reacts: Managing Global Risks of Emerging AI Technology

Increasingly sophisticated artificial intelligence...