SECURITY RESOURCES
Offensive minded security exploit development
Slides & Presentations, Threat Modeling, VerSprite Security Resources
Offensive Threat Models Against the Supply Chain
Cybersecurity Library, Ebooks & Guides, Geopolitical Risk, VerSprite Security Resources
Wellness Industry: 10 Ways Data Privacy Can Increase Your Competitive Edge
Integrated Risk Management (IRM)
Utilizing STIX to Foreshadow Cyber Security Risks
Cybersecurity Library, Ebooks & Guides, VerSprite Security Resources
Vendor Risk: Product vs. Custom Managed Services
Security Research
Part II: Analysis of a Vulnerable Microsoft Windows Named Pipe Application
Application Security
Phishing Attacks Through Cloned Websites
Security Operations
Network Security & Other Google Cloud Platform Concepts Defined
Security Research
Part I: The Fundamentals of Windows Vulnerable Named Pipes
Threat Modeling, VerSprite Security Resources, Webinars
Leveraging PASTA Threat Modeling for Strategic Security Operations Management & Exploit Testing
Geopolitical Risk, VerSprite Security Resources
Geopolitical Cyber Threats and Business Operations
Security Research
Analyzing CVE-2019-1436 on Windows 10 v1903
Application Security
Secure Your Website: Simple HTTPS with Nginx
Geopolitical Risk, Reports, VerSprite Security Resources, Webinars
Geopolitical Risk Webinar: The Top Geo-Cyber Supply Chain Risks & Opportunities
Application Security, Security Research
Utilizing Reverse Proxies to Inject Malicious Code & Extract Sensitive Information
Cloud Security, Security Operations
5 Techniques to Avoid Unwanted Outcomes with Cloud Security Scanner
Subscribe for Our
Updates
Please enter your email address and receive the latest updates