VerSprite Blog

Literary Antidotes for Today's Security Snake Oil

Explore the latest insights and stay informed on evolving digital threats

A Look at RACI Models within Application Threat Modeling

Threat Modeling

A Look at RACI Models within Application Threat Modeling

In this model, you will see engineers, network professionals, developers, architects, business analysts, project managers, security champions, pentesters, and quality assurance engineers. Because they all have some level of involvement and collaboration at different stages of application, as well as organizational, threat modeling ensures effective results.

Learn More

Category

View All
Attacking LastPass: Compromising an Entire Password Database
Application Security, Data Privacy & Development of Security Policies

Attacking LastPass: Compromising an Entire Password Database

LastPass is a commonly used cloud-based password m...

5 Fundamental Data Privacy Rights
Data Privacy & Development of Security Policies, Governance Risk & Compliance

5 Fundamental Data Privacy Rights

The ground-breaking California Consumer Privacy Ac...

The General Data Protection Regulation (GDPR): A Quick Guide for Organizations
Data Privacy & Development of Security Policies, Governance Risk & Compliance, Regulatory Compliance

The General Data Protection Regulation (GDPR): A Quick Guide for Organizations

GDPR is an encompassing regulation and policy chan...

Why Healthcare is an Attractive Target for Malicious Actors
Data Privacy & Development of Security Policies, Geopolitical Risk, Regulatory Compliance

Why Healthcare is an Attractive Target for Malicious Actors

The global healthcare sector suffers more breaches...

Incident Response: When The General Data Protection Regulation (GDPR) Requires Action
Data Privacy & Development of Security Policies, Governance Risk & Compliance, Regulatory Compliance

Incident Response: When The General Data Protection Regulation (GDPR) Requires Action

When an organization suffers a security incident t...

Gig Economy & Growing Security Gaps
Data Privacy & Development of Security Policies, Geopolitical Risk, Governance Risk & Compliance

Gig Economy & Growing Security Gaps

As the gig economy, and the use of temporary or on...

VerSprite Reacts: Aviation Scandal & Corporate Espionage
Data Privacy & Development of Security Policies, Geopolitical Risk

VerSprite Reacts: Aviation Scandal & Corporate Espionage

Corporate espionage is not a new phenomenon, but d...

VerSprite Reacts: Google+ Data Breach 
Data Privacy & Development of Security Policies, Geopolitical Risk

VerSprite Reacts: Google+ Data Breach 

Revelations of a massive breach of Google+, a larg...

Google Thwarts Employee Phishing Attack
Application Security, Data Privacy & Development of Security Policies

Google Thwarts Employee Phishing Attack

With network perimeters becoming more hardened, ph...

Adding and Using JEA in Your Windows Environment
Data Privacy & Development of Security Policies, Security Operations

Adding and Using JEA in Your Windows Environment

Imagine this scenario: You are a systems engineer....

Force Feeding Enterprise Security Failures
Application Security, Data Privacy & Development of Security Policies

Force Feeding Enterprise Security Failures

Metaphorically speaking, force-feeding enterprise ...