VerSprite Blog
VerSprite Blog
Literary Antidotes for Today's Security Snake Oil
Explore the latest insights and stay informed on evolving digital threats 
Application Security, Threat & Vulnerability Management
Critical Google Chrome Security Issue

Information Security Management System (ISMS), Integrated Risk Management (IRM)
Interactive Simulations: Risk Management That Is Greater Than the Sum of Its Parts

Application Security, Threat & Vulnerability Management
Why Google Automatic Sign-in is a Privacy Risk

Digital Forensics & Incident Response, Threat & Vulnerability Management
Can You Spot When You’re Being Phished?

Application Security, Security Training
TLS 1.3 and Major TLS Libraries Vulnerable

Governance Risk & Compliance
Vendor Risk: Coverage, Speed, Risk Relevance & Integration

Threat & Vulnerability Management
PHP 5.6 End of Life (EOL): Upgrade to Stable Version of PHP

Integrated Risk Management (IRM)
Podcast: Cyber-Geopolitics and the Role of Data

Integrated Risk Management (IRM)
Disappearing Dissidents – Powered by Tech

Application Security, Information Security Management System (ISMS)
VerSprite Earns CREST Certification

DevSecOps, Security Operations
The Main Tenets of DevOps: “Infrastructure as Code”

Application Security, Penetration Testing
MiTM Attack Between Target Windows Machines and a DNS Server

Threat & Vulnerability Management
libSSH Vulnerability: Do You Have to Worry?

Application Security, Cloud Security, Security Operations, Security Testing
How Hackers Can Attack Your Amazon Web Services (AWS) Resources

Integrated Risk Management (IRM)