VerSprite Blog
VerSprite Blog
Literary Antidotes for Today's Security Snake Oil
Explore the latest insights and stay informed on evolving digital threats 
Application Security, Information Security Management System (ISMS)
VerSprite Earns CREST Certification

DevSecOps, Security Operations
The Main Tenets of DevOps: “Infrastructure as Code”

Application Security, Penetration Testing
MiTM Attack Between Target Windows Machines and a DNS Server

Threat & Vulnerability Management
libSSH Vulnerability: Do You Have to Worry?

Application Security, Cloud Security, Security Operations, Security Testing
How Hackers Can Attack Your Amazon Web Services (AWS) Resources

Integrated Risk Management (IRM)
The Aadhaar Biometric Database Saga

Threat & Vulnerability Management
A New Tool for Finding Open S3 Buckets

Integrated Risk Management (IRM)
No Shortcuts in Cybersecurity

Data Privacy & Development of Security Policies, Integrated Risk Management (IRM)
VerSprite Reacts: Aviation Scandal & Corporate Espionage

Integrated Risk Management (IRM)
VerSprite Reacts: Artificial Intelligence Security Vulnerabilities

Integrated Risk Management (IRM)
VerSprite Podcast: Threat Libraries in the Cloud

Data Privacy & Development of Security Policies, Integrated Risk Management (IRM)
VerSprite Reacts: Google+ Data Breach

Application Security, Data Privacy & Development of Security Policies
Google Thwarts Employee Phishing Attack

Threat & Vulnerability Management
Critical Vulnerability in Apache Struts2

Integrated Risk Management (IRM)