SECURITY RESOURCES
Offensive minded security exploit development
VerSprite Security Resources, Videos
How to Spot Phishing Attacks as a Remote Employee

Security Training, VerSprite Security Resources, Videos
Security Considerations for Remote IT Staff

DevSecOps, VerSprite Security Resources
Shifting Security Left: Why You Shouldn’t Wait to Apply Security Controls

Geopolitical Risk, VerSprite Security Resources
Geopolitical Risk + Cybersecurity Strategy

Security Testing, Threat Modeling, VerSprite Security Resources
Risk-Based Security Threat Modeling: 7-Step Process for Risk Analysis

Threat Intelligence, Threat Modeling
Threat Modeling Steps: A Blueprint for Threat Intelligence

Application Security, Threat Modeling
Penetration Testing Methodology: Emulating Realistic Attacks by a Malicious Actor

Application Security, Security Operations
The Software Development Life Cycle & Application Security

Penetration Testing
NordVPN’s Strategic Cybersecurity Partnership with VerSprite

Security Research
Reversing Stories: Updating the Undocumented ESTROBJ and STROBJ Structures for Windows 10 x64

Security Research
Investigating Microsoft Windows Vulnerability CVE-2019-1169

Security Research
Automating CVE-2019-1436 Variant Analysis: An Intro to Detecting Information Leaks via IDAPython

Integrated Risk Management (IRM)
US-Iran Conflict: Increased Geopolitical Risk From Cyber Attacks Based Out of Iran

Slides & Presentations, Threat Modeling, VerSprite Security Resources
Offensive Threat Models Against the Supply Chain

Cybersecurity Library, Ebooks & Guides, Geopolitical Risk, VerSprite Security Resources
Wellness Industry: 10 Ways Data Privacy Can Increase Your Competitive Edge

Subscribe for Our
Updates
Please enter your email address and receive the latest updates