SECURITY RESOURCES
Offensive minded security exploit development
Supply Chains
VerSprite Cybersecurity Discusses Sunburst and Vendor Supply Chain Attacks

Application Security
A Targeted Vendor Risk Assessment Exposes Vulnerabilities

Cybersecurity Library, Ebooks & Guides, Supply Chains, VerSprite Security Resources
Using Risk-Based Threat Modeling to Protect Your Supply Chain

Geopolitical Risk, Supply Chains, VerSprite Security Resources
A Geopolitical Perspective on Supply Chain Risks and Opportunities

Podcasts, VerSprite Security Resources
FireEye Attack From A Nation-State Cybersecurity Discussing the Aftermath

VerSprite Security Resources, Videos, Webinars
Effective Cybersecurity Planning Starts and Ends in the Boardroom

Threat & Vulnerability Management, Threat Intelligence
Ematic, Wavlink, Winstars, and Jetstream Wi-Fi Routers Have Hidden Backdoor

Cloud Security
Top 5 Cloud Security Vulnerabilities & How to Mitigate Them

Threat & Vulnerability Management, Threat Intelligence
Top 3 Motives Why Cybercriminals Attack Social Media According to 2020 Threat Trends

Cloud Security
Shared Responsibility Model for Cloud Security

Security Research
Part 3: Reversing & Exploiting Custom Windows Named Pipe Servers

Security Research
VerSprite Cyberwatch

Threat Intelligence
How Red Teaming Exercises Could Have Prevented Experian’s Data Breach

Threat Intelligence, Virtual Security Operations Center vSOC
What is a Virtual Security Operations Center (vSOC) and What are Its Benefits?

Application Security, Security Testing
What is Responsible Disclosure?

Subscribe for Our
Updates
Please enter your email address and receive the latest updates