SECURITY RESOURCES
Offensive minded security exploit development
Security Training, VerSprite Security Resources, Videos
Security Considerations for Remote IT Staff

DevSecOps, VerSprite Security Resources
Shifting Security Left: Why You Shouldn’t Wait to Apply Security Controls

Geopolitical Risk, VerSprite Security Resources
Geopolitical Risk + Cybersecurity Strategy

Security Testing, Threat Modeling, VerSprite Security Resources
Risk-Based Security Threat Modeling: 7-Step Process for Risk Analysis

Threat Intelligence, Threat Modeling
Threat Modeling Steps: A Blueprint for Threat Intelligence

Application Security, Threat Modeling
Penetration Testing Methodology: Emulating Realistic Attacks by a Malicious Actor

Application Security, Security Operations
The Software Development Life Cycle & Application Security

Penetration Testing
NordVPN’s Strategic Cybersecurity Partnership with VerSprite

Security Research
Reversing Stories: Updating the Undocumented ESTROBJ and STROBJ Structures for Windows 10 x64

Security Research
Investigating Microsoft Windows Vulnerability CVE-2019-1169

Security Research
Automating CVE-2019-1436 Variant Analysis: An Intro to Detecting Information Leaks via IDAPython

Integrated Risk Management (IRM)
US-Iran Conflict: Increased Geopolitical Risk From Cyber Attacks Based Out of Iran

Slides & Presentations, Threat Modeling, VerSprite Security Resources
Offensive Threat Models Against the Supply Chain

Cybersecurity Library, Ebooks & Guides, Geopolitical Risk, VerSprite Security Resources
Wellness Industry: 10 Ways Data Privacy Can Increase Your Competitive Edge

Integrated Risk Management (IRM)
Utilizing STIX to Foreshadow Cyber Security Risks

Subscribe for Our
Updates
Please enter your email address and receive the latest updates