SECURITY RESOURCES
Offensive minded security exploit development
Application Security, Data Privacy & Development of Security Policies
Attacking LastPass: Compromising an Entire Password Database
Managed Security, Security Operations
5 Key Features of Google Stackdriver
Cybersecurity Library, Ebooks & Guides, VerSprite Security Resources
How to Minimize Data Risk & Strengthen Your Security Posture
Governance Risk & Compliance, Integrated Risk Management (IRM)
10 Data Privacy Tips: Wellness Industry & Growing Data Concerns
Data Privacy & Development of Security Policies, Governance Risk & Compliance
5 Fundamental Data Privacy Rights
In The News, VerSprite Security Resources, Videos
ATL Channel 2 News Interviews VerSprite CEO on Security Gaps Found in DeKalb Data Center
Cloud Security, Security Operations
Why an Increasing Number of Clients Are Migrating to Microsoft Azure
VerSprite Security Resources
Threat Models – Offensive Security & Defensive
Application Security, Security Research
Waves Maxx Audio DLL Side-Loading LPE via Windows Registry
Threat & Vulnerability Management
Microsoft Windows Remote Code Execution (RCE) Vulnerability: BlueKeep
Threat & Vulnerability Management
Microsoft Outlook for Android Vulnerable to Cross-Site Scripting
Application Security, Threat & Vulnerability Management
Mozilla Firefox Patches Multiple Zero Days
Application Security, Security Research
OH The POSsibilities: Point of Sale System Security
Data Privacy & Development of Security Policies, Governance Risk & Compliance, Regulatory Compliance
The General Data Protection Regulation (GDPR): A Quick Guide for Organizations
Digital Forensics & Incident Response, Security Research
Digging up the Past: OS X File Versioning
Subscribe for Our
Updates
Please enter your email address and receive the latest updates