SECURITY RESOURCES
Offensive minded security exploit development
Security Training, VerSprite Security Resources
Preparing Your Microsoft Office 365 Environment for Forensic Analysis
VerSprite Security Resources, Webinars
Back to Basics: Finding Clarity in General Data Protection Regulation (GDPR) Compliance
Threat & Vulnerability Management
NTML Passwords Insecure
Threat & Vulnerability Management
Critical Vulnerability in WordPress Core
Data Privacy & Development of Security Policies, Governance Risk & Compliance, Regulatory Compliance
Incident Response: When The General Data Protection Regulation (GDPR) Requires Action
Threat Modeling, VerSprite Security Resources
Building a Valid Threat Library for Cloud-Based Applications
Threat & Vulnerability Management
Identity and Access Management in Amazon Web Services (AWS)
Geopolitical Risk, Reports, VerSprite Security Resources
The Huawei Hoopla: ICTs, Chinese Tech, and the Need for Geo-Cyber Strategy
Digital Forensics & Incident Response
Understand Digital Forensics & Incident Response (DFIR)
Data Privacy & Development of Security Policies, Governance Risk & Compliance, Integrated Risk Management (IRM)
Gig Economy & Growing Security Gaps
Application Security, Digital Forensics & Incident Response, Governance Risk & Compliance
Phishing Site Uses Google Translate
In The News, VerSprite Security Resources, Videos
Georgia Tech Data Breach: VerSprite Interviewed on Threat Motives
Application Security, Threat & Vulnerability Management
Critical Google Chrome Security Issue
Information Security Management System (ISMS), Integrated Risk Management (IRM)
Interactive Simulations: Risk Management That Is Greater Than the Sum of Its Parts
Application Security, Threat & Vulnerability Management
Why Google Automatic Sign-in is a Privacy Risk
Subscribe for Our
Updates
Please enter your email address and receive the latest updates