SECURITY RESOURCES
Offensive minded security exploit development
Cloud Security
Top 5 Cloud Security Vulnerabilities & How to Mitigate Them
Threat & Vulnerability Management, Threat Intelligence
Top 3 Motives Why Cybercriminals Attack Social Media According to 2020 Threat Trends
Cloud Security
Shared Responsibility Model for Cloud Security
Security Research
Part 3: Reversing & Exploiting Custom Windows Named Pipe Servers
Security Research
VerSprite Cyberwatch
Threat Intelligence
How Red Teaming Exercises Could Have Prevented Experian’s Data Breach
Threat Intelligence, Virtual Security Operations Center vSOC
What is a Virtual Security Operations Center (vSOC) and What are its Benefits?
Application Security, Security Testing
What is Responsible Disclosure?
VerSprite Security Resources
Application Security on a Dime 2020
Slides & Presentations, VerSprite Security Resources
Intel Driven Threat Hunting
Slides & Presentations, VerSprite Security Resources
Understanding and Achieving CMMC Compliance
Slides & Presentations, VerSprite Security Resources
VerSprite To Speak at ISSA NC’s Security Summit
Slides & Presentations, VerSprite Security Resources, Webinars
Road to the Executive Seat Panel Discussion: The African American CISO Journey
Cloud Security, Podcasts, VerSprite Security Resources
Cloud Security Discussions and Advice on How to Move Your Business to the Cloud
Integrated Risk Management (IRM), Reports
How STIX Cyber Campaigns Provide Intel on Geopolitical and Cybersecurity Risks
Subscribe for Our
Updates
Please enter your email address and receive the latest updates