VerSprite Blog

Literary Antidotes for Today's Security Snake Oil

Explore the latest insights and stay informed on evolving digital threats
Integrating Threat Modeling Throughout Your Enterprise

Integrating Threat Modeling Throughout Your Enterprise

In this model, you will see engineers, network professionals, developers, architects, business analysts, project managers, security champions, pentesters, and quality assurance engineers. Because they all have some level of involvement and collaboration at different stages of application, as well as organizational, threat modeling ensures effective results.

Watch Now
5 Key Features of Google Stackdriver

5 Key Features of Google Stackdriver

Stackdriver provides a centralized method of receiving signals, logs, metrics, and traces from your GCP resources, so you can quickly see when there is any alert on your cloud.

Watch Now
Is Using Public WiFi Safe?

Is Using Public WiFi Safe?

Using public WiFi can leave you and your employees open to man-in-the-middle cyber attacks. With the increase of remote work, organizations must teach their employees how to stay safe on open WiFi networks. Get our tips on how to protect against hackers while on open WiFi networks.

Watch Now

Category

View All
VerSprite Partners with Stellar Cyber, Cybereason, & D3 Security to Streamline and Automate Virtual SOC Services
Virtual Security Operations Center vSOC

VerSprite Partners with Stellar Cyber, Cybereason, & D3 Security to Streamline and Automate Virtual SOC Services

Cybersecurity and Physical Attacks Against Your Business
Red Teaming and Social Engineering

Cybersecurity and Physical Attacks Against Your Business

What is Threat Modeling Within the Software Development Lifecycle?
Security Operations

What is Threat Modeling Within the Software Development Lifecycle?

Security Awareness Training VS Social Engineering Techniques
Application Security

Security Awareness Training VS Social Engineering Techniques

QUALITY – INDUSTRY STANDARDS – TRUST
Penetration Testing

QUALITY – INDUSTRY STANDARDS – TRUST

Growth. Ingenuity. Dedication to the Future of Cybersecurity.
Awards, In The News, News

Growth. Ingenuity. Dedication to the Future of Cybersecurity.

Threat Modeling Against Supply Chain
Application Security, Reports, Threat Modeling

Threat Modeling Against Supply Chain

Attacking Your Assumptions: How Criminal Tactics Can Save Your Organization
Application Security, Penetration Testing

Attacking Your Assumptions: How Criminal Tactics Can Save Your Organization

Raising the Bar in Application Security Verification
Application Security, Threat Modeling

Raising the Bar in Application Security Verification

Staying Lean with Cybersecurity Efforts when Budgets are Tight
Virtual Security Operations Center vSOC

Staying Lean with Cybersecurity Efforts when Budgets are Tight

Building a Modern Effective SOC – A Realistic Undertaking in 2022?
Virtual Security Operations Center vSOC

Building a Modern Effective SOC – A Realistic Undertaking in 2022?

ERAs are Dead. Long Live the Organizational Threat Model!
Threat Modeling

ERAs are Dead. Long Live the Organizational Threat Model!

Ransomware Readiness – When Failing is Good
Red Teaming and Social Engineering

Ransomware Readiness – When Failing is Good

Russia-Ukraine War, Cyberwarfare, and the Impact on Businesses Worldwide
Threat Intelligence

Russia-Ukraine War, Cyberwarfare, and the Impact on Businesses Worldwide

Why Context is King for Your Governance Program
Governance Risk & Compliance

Why Context is King for Your Governance Program