VerSprite Blog

Literary Antidotes for Today's Security Snake Oil

Explore the latest insights and stay informed on evolving digital threats

A Look at RACI Models within Application Threat Modeling

Threat Modeling

A Look at RACI Models within Application Threat Modeling

In this model, you will see engineers, network professionals, developers, architects, business analysts, project managers, security champions, pentesters, and quality assurance engineers. Because they all have some level of involvement and collaboration at different stages of application, as well as organizational, threat modeling ensures effective results.

Learn More

Category

View All
The General Data Protection Regulation (GDPR): A Quick Guide for Organizations
Data Privacy & Development of Security Policies, Governance Risk & Compliance, Regulatory Compliance

The General Data Protection Regulation (GDPR): A Quick Guide for Organizations

GDPR is an encompassing regulation and policy chan...

Why Healthcare is an Attractive Target for Malicious Actors
Data Privacy & Development of Security Policies, Geopolitical Risk, Regulatory Compliance

Why Healthcare is an Attractive Target for Malicious Actors

The global healthcare sector suffers more breaches...

Incident Response: When The General Data Protection Regulation (GDPR) Requires Action
Data Privacy & Development of Security Policies, Governance Risk & Compliance, Regulatory Compliance

Incident Response: When The General Data Protection Regulation (GDPR) Requires Action

When an organization suffers a security incident t...

Gig Economy & Growing Security Gaps
Data Privacy & Development of Security Policies, Geopolitical Risk, Governance Risk & Compliance

Gig Economy & Growing Security Gaps

As the gig economy, and the use of temporary or on...

Phishing Site Uses Google Translate
Application Security, Digital Forensics & Incident Response, Governance Risk & Compliance

Phishing Site Uses Google Translate

An innovative campaign to spread phishing was rece...

Vendor Risk: Coverage, Speed, Risk Relevance & Integration
Governance Risk & Compliance

Vendor Risk: Coverage, Speed, Risk Relevance & Integration

Most regulations are looking for some level of reg...

VerSprite Reacts: Aviation Scandal & Corporate Espionage
Data Privacy & Development of Security Policies, Geopolitical Risk

VerSprite Reacts: Aviation Scandal & Corporate Espionage

Corporate espionage is not a new phenomenon, but d...

VerSprite Reacts: Google+ Data Breach 
Data Privacy & Development of Security Policies, Geopolitical Risk

VerSprite Reacts: Google+ Data Breach 

Revelations of a massive breach of Google+, a larg...

Google Thwarts Employee Phishing Attack
Application Security, Data Privacy & Development of Security Policies

Google Thwarts Employee Phishing Attack

With network perimeters becoming more hardened, ph...

How to Manage & Monitor Your Cloud Infrastructure
Cloud Security, Regulatory Compliance

How to Manage & Monitor Your Cloud Infrastructure

Operating your cloud infrastructure isn’t a one-...

HIPAA with the Security Experts
Regulatory Compliance

HIPAA with the Security Experts

Join VerSprite and Hall Booth and Smith for the 4t...

Cyber Criminals Target Employees with W-2 Phishing Scam
Application Security, Digital Forensics & Incident Response, Governance Risk & Compliance

Cyber Criminals Target Employees with W-2 Phishing Scam

Tax season provides an opportunity for cyber crimi...

Swimming in the Deep End: Taking a Deeper Look at the Use Cases of JEA
Application Security, Governance Risk & Compliance

Swimming in the Deep End: Taking a Deeper Look at the Use Cases of JEA

Throughout my testing and implementation of JEA in...

Adding and Using JEA in Your Windows Environment
Data Privacy & Development of Security Policies, Security Operations

Adding and Using JEA in Your Windows Environment

Imagine this scenario: You are a systems engineer....

SSL/TLS Security – A Simplified, Quick Guide
Application Security, Governance Risk & Compliance, Information Security Management System (ISMS)

SSL/TLS Security – A Simplified, Quick Guide

Much of the following may be common knowledge to m...