VerSprite Blog
VerSprite Blog
Literary Antidotes for Today's Security Snake Oil
Explore the latest insights and stay informed on evolving digital threats 
Application Security
Secure Your Website: Simple HTTPS with Nginx

Cloud Security, Security Operations
5 Techniques to Avoid Unwanted Outcomes with Cloud Security Scanner

Cloud Security, Security Operations
How to Configure Google Cloud Armor as a Multi-Layer Firewall

Application Security, Data Privacy & Development of Security Policies
Attacking LastPass: Compromising an Entire Password Database

Managed Security, Security Operations
5 Key Features of Google Stackdriver

Governance Risk & Compliance, Integrated Risk Management (IRM)
10 Data Privacy Tips: Wellness Industry & Growing Data Concerns

Data Privacy & Development of Security Policies, Governance Risk & Compliance
5 Fundamental Data Privacy Rights

Cloud Security, Security Operations
Why an Increasing Number of Clients Are Migrating to Microsoft Azure

Threat & Vulnerability Management
Microsoft Windows Remote Code Execution (RCE) Vulnerability: BlueKeep

Threat & Vulnerability Management
Microsoft Outlook for Android Vulnerable to Cross-Site Scripting

Application Security, Threat & Vulnerability Management
Mozilla Firefox Patches Multiple Zero Days

Application Security, Security Research
OH The POSsibilities: Point of Sale System Security

Data Privacy & Development of Security Policies, Governance Risk & Compliance, Regulatory Compliance
The General Data Protection Regulation (GDPR): A Quick Guide for Organizations

Data Privacy & Development of Security Policies, Integrated Risk Management (IRM), Regulatory Compliance
Why Healthcare is an Attractive Target for Malicious Actors

Application Security, Information Security Management System (ISMS)