VerSprite Blog

Literary Antidotes for Today's Security Snake Oil

Explore the latest insights and stay informed on evolving digital threats
Integrating Threat Modeling Throughout Your Enterprise

Integrating Threat Modeling Throughout Your Enterprise

In this model, you will see engineers, network professionals, developers, architects, business analysts, project managers, security champions, pentesters, and quality assurance engineers. Because they all have some level of involvement and collaboration at different stages of application, as well as organizational, threat modeling ensures effective results.

Watch Now
5 Key Features of Google Stackdriver

5 Key Features of Google Stackdriver

Stackdriver provides a centralized method of receiving signals, logs, metrics, and traces from your GCP resources, so you can quickly see when there is any alert on your cloud.

Watch Now
Is Using Public WiFi Safe?

Is Using Public WiFi Safe?

Using public WiFi can leave you and your employees open to man-in-the-middle cyber attacks. With the increase of remote work, organizations must teach their employees how to stay safe on open WiFi networks. Get our tips on how to protect against hackers while on open WiFi networks.

Watch Now

Category

View All
VerSprite Podcast: Threat Libraries in the Cloud
Geopolitical Risk

VerSprite Podcast: Threat Libraries in the Cloud

VerSprite Reacts: Google+ Data Breach 
Data Privacy & Development of Security Policies, Geopolitical Risk

VerSprite Reacts: Google+ Data Breach 

Google Thwarts Employee Phishing Attack
Application Security, Data Privacy & Development of Security Policies

Google Thwarts Employee Phishing Attack

Critical Vulnerability in Apache Struts2
Threat & Vulnerability Management

Critical Vulnerability in Apache Struts2

VerSprite Reacts: Bloomberg’s Exposé on China
Geopolitical Risk

VerSprite Reacts: Bloomberg’s Exposé on China

What CISOs Need to Know About Geopolitical Risk
Geopolitical Risk, Information Security Management System (ISMS)

What CISOs Need to Know About Geopolitical Risk

Plain HTTP Websites Labeled “Not Secure”
Application Security, Threat & Vulnerability Management

Plain HTTP Websites Labeled “Not Secure”

How to Manage & Monitor Your Cloud Infrastructure
Cloud Security, Regulatory Compliance

How to Manage & Monitor Your Cloud Infrastructure

What is Geopolitical Risk & Why Do You Need It?
Geopolitical Risk

What is Geopolitical Risk & Why Do You Need It?

Why Androids are a Prime Target for Hackers
Information Security Management System (ISMS), Mobile Security Testing

Why Androids are a Prime Target for Hackers

Cybersecurity & Geopolitical Risk: What Executives Need to Know
Geopolitical Risk

Cybersecurity & Geopolitical Risk: What Executives Need to Know

HIPAA with the Security Experts
Regulatory Compliance

HIPAA with the Security Experts

Cyber Criminals Target Employees with W-2 Phishing Scam
Application Security, Digital Forensics & Incident Response, Governance Risk & Compliance

Cyber Criminals Target Employees with W-2 Phishing Scam

Swimming in the Deep End: Taking a Deeper Look at the Use Cases of JEA
Application Security, Governance Risk & Compliance

Swimming in the Deep End: Taking a Deeper Look at the Use Cases of JEA

Risk Centric Threat Models for Internet of Things (IoT) & Medical Devices
Application Security, Threat Modeling

Risk Centric Threat Models for Internet of Things (IoT) & Medical Devices