VerSprite Blog
VerSprite Blog
Explore the latest insights and stay informed on evolving digital threats
Literary Antidotes for Today's Security Snake Oil
Threat Modeling
A Look at RACI Models within Application Threat Modeling
In this model, you will see engineers, network professionals, developers, architects, business analysts, project managers, security champions, pentesters, and quality assurance engineers. Because they all have some level of involvement and collaboration at different stages of application, as well as organizational, threat modeling ensures effective results.
Learn MoreThe General Data Protection Regulation (GDPR): A Quick Guide for Organizations
GDPR is an encompassing regulation and policy chan...
Why Healthcare is an Attractive Target for Malicious Actors
The global healthcare sector suffers more breaches...
Incident Response: When The General Data Protection Regulation (GDPR) Requires Action
When an organization suffers a security incident t...
Gig Economy & Growing Security Gaps
As the gig economy, and the use of temporary or on...
Phishing Site Uses Google Translate
An innovative campaign to spread phishing was rece...
Vendor Risk: Coverage, Speed, Risk Relevance & Integration
Most regulations are looking for some level of reg...
VerSprite Reacts: Aviation Scandal & Corporate Espionage
Corporate espionage is not a new phenomenon, but d...
VerSprite Reacts: Google+ Data Breach
Revelations of a massive breach of Google+, a larg...
Google Thwarts Employee Phishing Attack
With network perimeters becoming more hardened, ph...
How to Manage & Monitor Your Cloud Infrastructure
Operating your cloud infrastructure isn’t a one-...
HIPAA with the Security Experts
Join VerSprite and Hall Booth and Smith for the 4t...
Cyber Criminals Target Employees with W-2 Phishing Scam
Tax season provides an opportunity for cyber crimi...
Swimming in the Deep End: Taking a Deeper Look at the Use Cases of JEA
Throughout my testing and implementation of JEA in...
Adding and Using JEA in Your Windows Environment
Imagine this scenario: You are a systems engineer....
SSL/TLS Security – A Simplified, Quick Guide
Much of the following may be common knowledge to m...