SECURITY RESOURCES
Offensive minded security exploit development
Security Research
Windows Named Pipes Part 4: Taking a Trip Down Static Analysis Lane

Cybersecurity Library, Ebooks & Guides, VerSprite Security Resources
Third-Party Risk Management Software (VRA vs. TPRM) vs. Vendor Risk Assessment Services

Governance Risk & Compliance
Informe Sobre Amenazas a la Seguridad Empresarial 2021

Governance Risk & Compliance, Reports
2021 Business Security Threats Briefing

Cybersecurity Library, Ebooks & Guides, Geopolitical Risk, Reports, VerSprite Security Resources
Top 6 Cybersecurity Threats in 2021

Supply Chains
Operation SignSight: Software Supply Chain Attack Hits Vietnamese Government

Supply Chains
VerSprite Cybersecurity Discusses Sunburst and Vendor Supply Chain Attacks

Application Security
A Targeted Vendor Risk Assessment Exposes Vulnerabilities

Cybersecurity Library, Ebooks & Guides, Supply Chains, VerSprite Security Resources
Using Risk-Based Threat Modeling to Protect Your Supply Chain

Geopolitical Risk, Supply Chains, VerSprite Security Resources
A Geopolitical Perspective on Supply Chain Risks and Opportunities

Podcasts, VerSprite Security Resources
FireEye Attack From A Nation-State Cybersecurity Discussing the Aftermath

VerSprite Security Resources, Videos, Webinars
Effective Cybersecurity Planning Starts and Ends in the Boardroom

Threat & Vulnerability Management, Threat Intelligence
Ematic, Wavlink, Winstars, and Jetstream Wi-Fi Routers Have Hidden Backdoor

Cloud Security
Top 5 Cloud Security Vulnerabilities & How to Mitigate Them

Threat & Vulnerability Management, Threat Intelligence
Top 3 Motives Why Cybercriminals Attack Social Media According to 2020 Threat Trends

Subscribe for Our
Updates
Please enter your email address and receive the latest updates