VerSprite Blog
VerSprite Blog
Literary Antidotes for Today's Security Snake Oil
Explore the latest insights and stay informed on evolving digital threats ![Why Threat Hunting Should Be Included in Your Mergers & Acquisitions Playbook](https://versprite.com/wp-content/uploads/2017/08/threat-hunting-2-1024x576.png)
Digital Forensics & Incident Response
Why Threat Hunting Should Be Included in Your Mergers & Acquisitions Playbook
![Adding and Using JEA in Your Windows Environment](https://versprite.com/wp-content/uploads/2017/06/Using-JEA-in-Your-Windows-Environment-1024x576.png)
Data Privacy & Development of Security Policies, Security Operations
Adding and Using JEA in Your Windows Environment
![SSL/TLS Security – A Simplified, Quick Guide](https://versprite.com/wp-content/uploads/2017/05/SSLTLS-Security-1024x576.png)
Application Security, Governance Risk & Compliance, Information Security Management System (ISMS)
SSL/TLS Security – A Simplified, Quick Guide
![Unknown jQuery-File-Upload Vulnerability Used for Years](https://versprite.com/wp-content/uploads/2016/12/jQuery-vulnerability-1024x576.png)
Threat & Vulnerability Management
Unknown jQuery-File-Upload Vulnerability Used for Years
![Medical Record Retention Across States (HIPAA / HITECH)](https://versprite.com/wp-content/uploads/2015/09/HIPAA-privacy-1024x576.png)
Governance Risk & Compliance, Information Security Management System (ISMS), Regulatory Compliance
Medical Record Retention Across States (HIPAA / HITECH)
![Command Injection in the WD My Cloud NAS](https://versprite.com/wp-content/uploads/2015/09/WD-My-Cloud-1024x576.png)
Application Security, Cloud Security, Information Security Management System (ISMS)
Command Injection in the WD My Cloud NAS
![Anti-Nausea Medicine for LastPass, Password Management FUD](https://versprite.com/wp-content/uploads/2015/06/password-management-1024x576.png)
Application Security, Governance Risk & Compliance, Information Security Management System (ISMS), Regulatory Compliance
Anti-Nausea Medicine for LastPass, Password Management FUD
![Why Threat Free Threat Modeling Doesn’t Work](https://versprite.com/wp-content/uploads/2015/05/threat-free-threat-modeling-1024x576.png)
Application Security, Threat Modeling
Why Threat Free Threat Modeling Doesn’t Work
![Assessing Emerging JavaScript Platforms with Express.js and Node.js – What to Look For](https://versprite.com/wp-content/uploads/2015/04/Node.js-1024x576.png)
Application Security, Information Security Management System (ISMS)
Assessing Emerging JavaScript Platforms with Express.js and Node.js – What to Look For
![Security Metrics Rehab – Part One](https://versprite.com/wp-content/uploads/2015/04/security-metrics-1024x576.png)
Governance Risk & Compliance, Information Security Management System (ISMS)
Security Metrics Rehab – Part One
![The Truth About Chinese Hardware Implants](https://versprite.com/wp-content/uploads/2014/12/Supermicro-chip-in-US-business-1024x576.png)
Threat & Vulnerability Management
The Truth About Chinese Hardware Implants
![Unsafe Application State Restoration (iOS)](https://versprite.com/wp-content/uploads/2014/06/unsafe-application-state-restoration-1024x576.png)
Application Security, Mobile Security Testing, Risk Assessments
Unsafe Application State Restoration (iOS)
![Force Feeding Enterprise Security Failures](https://versprite.com/wp-content/uploads/2014/03/enterprise-security-failures-1024x576.png)
Application Security, Data Privacy & Development of Security Policies
Force Feeding Enterprise Security Failures
![How STIX Cyber Campaigns Provide Intel on Geopolitical and Cybersecurity Risks](https://versprite.com/wp-content/uploads/2010/06/STIX-formatted-data-1024x576.png)
Integrated Risk Management (IRM)