VerSprite Blog

Literary Antidotes for Today's Security Snake Oil

Explore the latest insights and stay informed on evolving digital threats

A Look at RACI Models within Application Threat Modeling

Threat Modeling

A Look at RACI Models within Application Threat Modeling

In this model, you will see engineers, network professionals, developers, architects, business analysts, project managers, security champions, pentesters, and quality assurance engineers. Because they all have some level of involvement and collaboration at different stages of application, as well as organizational, threat modeling ensures effective results.

Learn More

Category

View All
The Main Tenets of DevOps: “Infrastructure as Code”
DevSecOps, Security Operations

The Main Tenets of DevOps: “Infrastructure as Code”

DevOps is a fundamental shift in the way we build,…

MiTM Attack Between Target Windows Machines and a DNS Server
Application Security, Penetration Testing

MiTM Attack Between Target Windows Machines and a DNS Server

When performing this attack, we will find two diff…

libSSH Vulnerability: Do You Have to Worry?
Threat & Vulnerability Management

libSSH Vulnerability: Do You Have to Worry?

In October 2018, it was revealed that there existe…

How Hackers Can Attack Your Amazon Web Services (AWS) Resources
Application Security, Cloud Security, Security Operations, Security Testing

How Hackers Can Attack Your Amazon Web Services (AWS) Resources

Stolen credentials remain the number one action in…

The Aadhaar Biometric Database Saga
Geopolitical Risk

The Aadhaar Biometric Database Saga

Aadhaar was developed in 2009 by the Unique Identi…

A New Tool for Finding Open S3 Buckets
Threat & Vulnerability Management

A New Tool for Finding Open S3 Buckets

Open web directories have long been a target of ha…

No Shortcuts in Cybersecurity
Geopolitical Risk

No Shortcuts in Cybersecurity

Following recent news reports of substantial data …

VerSprite Reacts: Aviation Scandal & Corporate Espionage
Data Privacy & Development of Security Policies, Geopolitical Risk

VerSprite Reacts: Aviation Scandal & Corporate Espionage

Corporate espionage is not a new phenomenon, but d…

VerSprite Reacts: Artificial Intelligence Security Vulnerabilities
Geopolitical Risk

VerSprite Reacts: Artificial Intelligence Security Vulnerabilities

Increasingly sophisticated artificial intelligence…

VerSprite Podcast: Threat Libraries in the Cloud
Geopolitical Risk

VerSprite Podcast: Threat Libraries in the Cloud

Tony started VerSprite with the idea of developing…

VerSprite Reacts: Google+ Data Breach 
Data Privacy & Development of Security Policies, Geopolitical Risk

VerSprite Reacts: Google+ Data Breach 

Revelations of a massive breach of Google+, a larg…

Google Thwarts Employee Phishing Attack
Application Security, Data Privacy & Development of Security Policies

Google Thwarts Employee Phishing Attack

With network perimeters becoming more hardened, ph…

Critical Vulnerability in Apache Struts2
Threat & Vulnerability Management

Critical Vulnerability in Apache Struts2

A critical security flaw in Apache Struts2 makes i…

VerSprite Reacts: Bloomberg’s Exposé on China
Geopolitical Risk

VerSprite Reacts: Bloomberg’s Exposé on China

Bloomberg’s exposé on China’s efforts to inf…

What CISOs Need to Know About Geopolitical Risk
Geopolitical Risk, Information Security Management System (ISMS)

What CISOs Need to Know About Geopolitical Risk

A responsible CISO takes command by understanding …