VerSprite Blog
VerSprite Blog
Literary Antidotes for Today's Security Snake Oil
Explore the latest insights and stay informed on evolving digital threats 
Cloud Security, Security Operations
How to Configure Google Cloud Armor as a Multi-Layer Firewall

Application Security, Data Privacy & Development of Security Policies
Attacking LastPass: Compromising an Entire Password Database

Managed Security, Security Operations
5 Key Features of Google Stackdriver

Governance Risk & Compliance, Integrated Risk Management (IRM)
10 Data Privacy Tips: Wellness Industry & Growing Data Concerns

Data Privacy & Development of Security Policies, Governance Risk & Compliance
5 Fundamental Data Privacy Rights

Cloud Security, Security Operations
Why an Increasing Number of Clients Are Migrating to Microsoft Azure

Threat & Vulnerability Management
Microsoft Windows Remote Code Execution (RCE) Vulnerability: BlueKeep

Threat & Vulnerability Management
Microsoft Outlook for Android Vulnerable to Cross-Site Scripting

Application Security, Threat & Vulnerability Management
Mozilla Firefox Patches Multiple Zero Days

Application Security, Security Research
OH The POSsibilities: Point of Sale System Security

Data Privacy & Development of Security Policies, Governance Risk & Compliance, Regulatory Compliance
The General Data Protection Regulation (GDPR): A Quick Guide for Organizations

Data Privacy & Development of Security Policies, Integrated Risk Management (IRM), Regulatory Compliance
Why Healthcare is an Attractive Target for Malicious Actors

Application Security, Information Security Management System (ISMS)
Attacking Weakly-Configured EAP-TLS Wireless Infrastructures

Integrated Risk Management (IRM)
Growing Intersection of Geopolitics and Cybersecurity

Threat & Vulnerability Management