VerSprite Blog
VerSprite Blog
Literary Antidotes for Today's Security Snake Oil
Explore the latest insights and stay informed on evolving digital threats 
Application Security, Governance Risk & Compliance
Swimming in the Deep End: Taking a Deeper Look at the Use Cases of JEA

Application Security, Threat Modeling
Risk Centric Threat Models for Internet of Things (IoT) & Medical Devices

Digital Forensics & Incident Response
Why Threat Hunting Should Be Included in Your Mergers & Acquisitions Playbook

Data Privacy & Development of Security Policies, Security Operations
Adding and Using JEA in Your Windows Environment

Application Security, Governance Risk & Compliance, Information Security Management System (ISMS)
SSL/TLS Security – A Simplified, Quick Guide

Threat & Vulnerability Management
Unknown jQuery-File-Upload Vulnerability Used for Years

Governance Risk & Compliance, Information Security Management System (ISMS), Regulatory Compliance
HITECH /HIPAA Privacy Rule Medical Record Retention

Application Security, Cloud Security, Information Security Management System (ISMS)
Command Injection in the WD My Cloud NAS

Application Security, Governance Risk & Compliance, Information Security Management System (ISMS), Regulatory Compliance
Anti-Nausea Medicine for LastPass, Password Management FUD

Application Security, Threat Modeling
Why Threat-Free Threat Modeling Doesn’t Work

Application Security, Information Security Management System (ISMS)
Assessing Emerging JavaScript Platforms with Express.js and Node.js – What to Look For

Governance Risk & Compliance, Information Security Management System (ISMS)
Security Metrics Rehab – Part One

Threat & Vulnerability Management
The Truth About Chinese Hardware Implants

Application Security, Mobile Security Testing, Risk Assessments
Unsafe Application State Restoration (iOS)

Application Security, Data Privacy & Development of Security Policies