SECURITY RESOURCES
Offensive minded security exploit development
Security Training, VerSprite Security Resources, Videos
Security Considerations for Remote IT Staff
DevSecOps, VerSprite Security Resources
Shifting Security Left: Why You Shouldn’t Wait to Apply Security Controls
Geopolitical Risk, VerSprite Security Resources
Geopolitical Risk + Cybersecurity Strategy
Security Testing, Threat Modeling, VerSprite Security Resources
Risk-Based Security Threat Modeling: 7-Step Process for Risk Analysis
Threat Intelligence, Threat Modeling
Threat Modeling Steps: A Blueprint for Threat Intelligence
Application Security, Threat Modeling
Penetration Testing Methodology: Emulating Realistic Attacks by a Malicious Actor
Application Security, Security Operations
The Software Development Life Cycle & Application Security
Penetration Testing
NordVPN’s Strategic Cybersecurity Partnership with VerSprite
Security Research
Reversing Stories: Updating the Undocumented ESTROBJ and STROBJ Structures for Windows 10 x64
Security Research
Investigating Microsoft Windows Vulnerability CVE-2019-1169
Security Research
Automating CVE-2019-1436 Variant Analysis: An Intro to Detecting Information Leaks via IDAPython
Application Security, Penetration Testing
How Secure Are Your Universally Unique IDentifiers (UUIDs)?
Integrated Risk Management (IRM)
US-Iran Conflict: Increased Geopolitical Risk From Cyber Attacks Based Out of Iran
Slides & Presentations, Threat Modeling, VerSprite Security Resources
Offensive Threat Models Against the Supply Chain
Cybersecurity Library, Ebooks & Guides, Geopolitical Risk, VerSprite Security Resources
Wellness Industry: 10 Ways Data Privacy Can Increase Your Competitive Edge
Subscribe for Our
Updates
Please enter your email address and receive the latest updates