VerSprite Blog
VerSprite Blog
Literary Antidotes for Today's Security Snake Oil
Explore the latest insights and stay informed on evolving digital threats ![TLS 1.3 and Major TLS Libraries Vulnerable](https://versprite.com/wp-content/uploads/2019/03/TLS-1.3-and-Major-TLS-Libraries-Vulnerable-1024x576.png)
Application Security, Security Training
TLS 1.3 and Major TLS Libraries Vulnerable
![Vendor Risk: Coverage, Speed, Risk Relevance & Integration](https://versprite.com/wp-content/uploads/2019/03/vendor-risk-1024x576.png)
Governance Risk & Compliance
Vendor Risk: Coverage, Speed, Risk Relevance & Integration
![PHP 5.6 End of Life (EOL): Upgrade to Stable Version of PHP](https://versprite.com/wp-content/uploads/2019/02/PHP-5.6-1024x576.png)
Threat & Vulnerability Management
PHP 5.6 End of Life (EOL): Upgrade to Stable Version of PHP
![Podcast: Cyber-Geopolitics and the Role of Data](https://versprite.com/wp-content/uploads/2019/02/geopolitics-in-data-1024x576.png)
Integrated Risk Management (IRM)
Podcast: Cyber-Geopolitics and the Role of Data
![Disappearing Dissidents – Powered by Tech](https://versprite.com/wp-content/uploads/2019/02/Technology-empowering-oppressive-governments-2-1024x576.png)
Integrated Risk Management (IRM)
Disappearing Dissidents – Powered by Tech
![VerSprite Earns CREST Certification](https://versprite.com/wp-content/uploads/2019/02/CREST-accredited-1024x576.png)
Application Security, Information Security Management System (ISMS)
VerSprite Earns CREST Certification
![The Main Tenets of DevOps: “Infrastructure as Code”](https://versprite.com/wp-content/uploads/2019/01/Integrating-Security-into-DevOps-1024x576.png)
DevSecOps, Security Operations
The Main Tenets of DevOps: “Infrastructure as Code”
![MiTM Attack Between Target Windows Machines and a DNS Server](https://versprite.com/wp-content/uploads/2019/01/MiTM-DNS-Spoofing-1024x576.png)
Application Security, Penetration Testing
MiTM Attack Between Target Windows Machines and a DNS Server
![libSSH Vulnerability: Do You Have to Worry?](https://versprite.com/wp-content/uploads/2018/12/libSSH-vulnerability-1024x576.png)
Threat & Vulnerability Management
libSSH Vulnerability: Do You Have to Worry?
![How Hackers Can Attack Your Amazon Web Services (AWS) Resources](https://versprite.com/wp-content/uploads/2018/12/securing-AWS-resources-1024x576.png)
Application Security, Cloud Security, Security Operations, Security Testing
How Hackers Can Attack Your Amazon Web Services (AWS) Resources
![The Aadhaar Biometric Database Saga](https://versprite.com/wp-content/uploads/2018/11/Aadhaar-Biometric-Database-1024x576.png)
Integrated Risk Management (IRM)
The Aadhaar Biometric Database Saga
![A New Tool for Finding Open S3 Buckets](https://versprite.com/wp-content/uploads/2018/10/Open-s3-Buckets-1024x576.png)
Threat & Vulnerability Management
A New Tool for Finding Open S3 Buckets
![No Shortcuts in Cybersecurity](https://versprite.com/wp-content/uploads/2018/10/no-shortcuts-in-cybersecurity-1024x576.png)
Integrated Risk Management (IRM)
No Shortcuts in Cybersecurity
![VerSprite Reacts: Aviation Scandal & Corporate Espionage](https://versprite.com/wp-content/uploads/2018/10/corporate-espionage-1024x576.png)
Data Privacy & Development of Security Policies, Integrated Risk Management (IRM)
VerSprite Reacts: Aviation Scandal & Corporate Espionage
![VerSprite Reacts: Artificial Intelligence Security Vulnerabilities](https://versprite.com/wp-content/uploads/2018/10/Artificial-Intelligence-Security-Vulnerabilities-1024x576.png)
Integrated Risk Management (IRM)