SECURITY RESOURCES
Offensive minded security exploit development
Security Research
Part I: The Fundamentals of Windows Vulnerable Named Pipes

Threat Modeling, VerSprite Security Resources, Webinars
Leveraging PASTA Threat Modeling for Strategic Security Operations Management & Exploit Testing

Geopolitical Risk, VerSprite Security Resources
Geopolitical Cyber Threats and Business Operations

Security Research
Analyzing CVE-2019-1436 on Windows 10 v1903

Application Security
Secure Your Website: Simple HTTPS with Nginx

Geopolitical Risk, Reports, VerSprite Security Resources, Webinars
Geopolitical Risk Webinar: The Top Geo-Cyber Supply Chain Risks & Opportunities

Application Security, Security Research
Utilizing Reverse Proxies to Inject Malicious Code & Extract Sensitive Information

Cloud Security, Security Operations
5 Techniques to Avoid Unwanted Outcomes with Cloud Security Scanner

Cloud Security, Security Operations
How to Configure Google Cloud Armor as a Multi-Layer Firewall

Application Security, Data Privacy & Development of Security Policies
Attacking LastPass: Compromising an Entire Password Database

Managed Security, Security Operations
5 Key Features of Google Stackdriver

Cybersecurity Library, Ebooks & Guides, VerSprite Security Resources
How to Minimize Data Risk & Strengthen Your Security Posture

Governance Risk & Compliance, Integrated Risk Management (IRM)
10 Data Privacy Tips: Wellness Industry & Growing Data Concerns

Data Privacy & Development of Security Policies, Governance Risk & Compliance
5 Fundamental Data Privacy Rights

In The News, VerSprite Security Resources, Videos
ATL Channel 2 News Interviews VerSprite CEO on Security Gaps Found in DeKalb Data Center

Subscribe for Our
Updates
Please enter your email address and receive the latest updates