SECURITY RESOURCES
Offensive minded security exploit development
Geopolitical Risk, Supply Chains, VerSprite Security Resources
A Geopolitical Perspective on Supply Chain Risks and Opportunities
What are the geopolitical risks of physical and digital supply chain attacks to your organization? Join VerSprite and CLASS-LLC in a webinar on the top risks and mitigation strategies to use in 2020.
Watch Now- All Resources
- Awards
- Case Study
- Cloud Security
- Cybersecurity Library
- Cyberwatch
- DevSecOps
- Digital Forensics & Incident Response
- Ebooks & Guides
- Geopolitical Risk
- In The News
- Podcasts
- Possible Use Cases
- Red Teaming and Social Engineering
- Reports
- Research Advisories
- Security Products
- Security Testing
- Security Training
- Slides & Presentations
- Supply Chains
- Threat Modeling
- VerSprite Security Resources
- Videos
- Web Application Security
- Webinars
Mobile Security Testing, OffSec, Penetration Testing, Security Testing
The Intersection of Artificial Intelligence and Social Engineering: Next-Generation Threats
Cloud Security, DevSecOps
Identity and Access Management: The First Defense in Cloud Security
Governance Risk & Compliance
Maximizing Impact: Making the Most of Your “15 Minutes” with the Executive Board on Cybersecurity
Application Security, Penetration Testing
The DevOps Approach to Automating C2 Infrastructure (Part Two)
News
Cybersecurity Innovator VerSprite Recognized on the Inc 5000 List for the Fourth Consecutive Year
Application Security, Penetration Testing
The DevOps Approach to Automating C2 Infrastructure (Part One)
Governance Risk & Compliance, In The News, Regulatory Compliance
Navigating the SEC’s 4-Day Disclosure Requirement: A Comprehensive Guide for CISOs
In The News, Threat & Vulnerability Management
The Advancement of AI in Cybersecurity: What You Need to Know
DevSecOps, Software Composition Analysis
Software Composition Analysis: The Changing Role of SCA
Digital Forensics & Incident Response, Governance Risk & Compliance, Risk Assessments, Security Testing, Supply Chains, Threat & Vulnerability Management, Threat Intelligence, Threat Modeling
8 Weeks Later: Lessons Learned from the MOVEit Vulnerability
Threat & Vulnerability Management
Proactive Malware Threat-Hunting: Benefits, Techniques, and Trends
Threat & Vulnerability Management, Threat Modeling
Virtual Security Solution for Your Organization – VerSprite VSOC
Threat & Vulnerability Management, Threat Modeling
Determining Impact and Probability in Risk-Centric Threat Modeling (With PASTA)
Security Operations, Threat Intelligence, Threat Modeling
Ransomware Recovery – 5 Action Items Missing from Your Plan
Application Security, Penetration Testing
Application Pen Testing Black, Grey, and White Box Testing
Subscribe for Our
Updates
Please enter your email address and receive the latest updates