SECURITY RESOURCES
Black Hat minded security exploit development
Security Training, VerSprite Security Resources
How To Keep Company Data Secure in Remote Office Settings
Security Training, VerSprite Security Resources
Security Risks for Home and Remote Work Networks
VerSprite Security Resources, Videos
How to Spot Phishing Attacks as a Remote Employee
Security Training, VerSprite Security Resources, Videos
Security Considerations for Remote IT Staff
DevSecOps, VerSprite Security Resources
Shifting Security Left: Why You Shouldn’t Wait to Apply Security Controls
Geopolitical Risk, VerSprite Security Resources
Geopolitical Risk + Cybersecurity Strategy
Security Testing, VerSprite Security Resources, Threat Modeling
Risk-Based Security Threat Modeling: 7-Step Process for Risk Analysis
Threat Intelligence, Threat Modeling
Threat Modeling Steps: A Blueprint for Threat Intelligence
Application Security, Threat Modeling
Penetration Testing Methodology: Emulating Realistic Attacks by a Malicious Actor
Application Security, Security Operations
The Software Development Life Cycle & Application Security
Penetration Testing
NordVPN’s Strategic Cybersecurity Partnership with VerSprite
Security Research
Reversing Stories: Updating the Undocumented ESTROBJ and STROBJ Structures for Windows 10 x64
Security Research
Investigating Microsoft Windows Vulnerability CVE-2019-1169
Security Research
Automating CVE-2019-1436 Variant Analysis: An Intro to Detecting Information Leaks via IDAPython
Integrated Risk Management (IRM)
US-Iran Conflict: Increased Geopolitical Risk From Cyber Attacks Based Out of Iran
Subscribe for Our
Updates
Please enter your email address and receive the latest updates