VerSprite Blog
VerSprite Blog
Literary Antidotes for Today's Security Snake Oil
Explore the latest insights and stay informed on evolving digital threats 
Application Security, Threat Modeling
Risk Centric Threat Models for Internet of Things (IoT) & Medical Devices

Digital Forensics & Incident Response
Why Threat Hunting Should Be Included in Your Mergers & Acquisitions Playbook

Data Privacy & Development of Security Policies, Security Operations
Adding and Using JEA in Your Windows Environment

Application Security, Governance Risk & Compliance, Information Security Management System (ISMS)
SSL/TLS Security – A Simplified, Quick Guide

Threat & Vulnerability Management
Unknown jQuery-File-Upload Vulnerability Used for Years

Governance Risk & Compliance, Information Security Management System (ISMS), Regulatory Compliance
HITECH /HIPAA Privacy Rule Medical Record Retention

Application Security, Cloud Security, Information Security Management System (ISMS)
Command Injection in the WD My Cloud NAS

Application Security, Governance Risk & Compliance, Information Security Management System (ISMS), Regulatory Compliance
Anti-Nausea Medicine for LastPass, Password Management FUD

Application Security, Threat Modeling
Why Threat-Free Threat Modeling Doesn’t Work

Application Security, Information Security Management System (ISMS)
Assessing Emerging JavaScript Platforms with Express.js and Node.js – What to Look For

Governance Risk & Compliance, Information Security Management System (ISMS)
Security Metrics Rehab – Part One

Threat & Vulnerability Management
The Truth About Chinese Hardware Implants

Application Security, Mobile Security Testing, Risk Assessments
Unsafe Application State Restoration (iOS)

Application Security, Data Privacy & Development of Security Policies
Force Feeding Enterprise Security Failures

Integrated Risk Management (IRM)