VerSprite Blog
VerSprite Blog
Literary Antidotes for Today's Security Snake Oil
Explore the latest insights and stay informed on evolving digital threats 
Threat & Vulnerability Management
Microsoft Windows Remote Code Execution (RCE) Vulnerability: BlueKeep

Threat & Vulnerability Management
Microsoft Outlook for Android Vulnerable to Cross-Site Scripting

Application Security, Threat & Vulnerability Management
Mozilla Firefox Patches Multiple Zero Days

Application Security, Security Research
OH The POSsibilities: Point of Sale System Security

Data Privacy & Development of Security Policies, Governance Risk & Compliance, Regulatory Compliance
The General Data Protection Regulation (GDPR): A Quick Guide for Organizations

Data Privacy & Development of Security Policies, Integrated Risk Management (IRM), Regulatory Compliance
Why Healthcare is an Attractive Target for Malicious Actors

Application Security, Information Security Management System (ISMS)
Attacking Weakly-Configured EAP-TLS Wireless Infrastructures

Integrated Risk Management (IRM)
Growing Intersection of Geopolitics and Cybersecurity

Threat & Vulnerability Management
NTML Passwords Insecure

Threat & Vulnerability Management
Critical Vulnerability in WordPress Core

Data Privacy & Development of Security Policies, Governance Risk & Compliance, Regulatory Compliance
Incident Response: When The General Data Protection Regulation (GDPR) Requires Action

Threat & Vulnerability Management
Identity and Access Management in Amazon Web Services (AWS)

Digital Forensics & Incident Response
Understand Digital Forensics & Incident Response (DFIR)

Data Privacy & Development of Security Policies, Governance Risk & Compliance, Integrated Risk Management (IRM)
Gig Economy & Growing Security Gaps

Application Security, Digital Forensics & Incident Response, Governance Risk & Compliance