SECURITY RESOURCES
Offensive minded security exploit development
Cloud Security, Security Operations
Why an Increasing Number of Clients Are Migrating to Microsoft Azure

VerSprite Security Resources
Threat Models – Offensive Security & Defensive

Application Security, Security Research
Waves Maxx Audio DLL Side-Loading LPE via Windows Registry

Threat & Vulnerability Management
Microsoft Windows Remote Code Execution (RCE) Vulnerability: BlueKeep

Threat & Vulnerability Management
Microsoft Outlook for Android Vulnerable to Cross-Site Scripting

Application Security, Threat & Vulnerability Management
Mozilla Firefox Patches Multiple Zero Days

Application Security, Security Research
OH The POSsibilities: Point of Sale System Security

Data Privacy & Development of Security Policies, Governance Risk & Compliance, Regulatory Compliance
The General Data Protection Regulation (GDPR): A Quick Guide for Organizations

Digital Forensics & Incident Response, Security Research
Digging up the Past: OS X File Versioning

Data Privacy & Development of Security Policies, Integrated Risk Management (IRM), Regulatory Compliance
Why Healthcare is an Attractive Target for Malicious Actors

Application Security, Information Security Management System (ISMS)
Attacking Weakly-Configured EAP-TLS Wireless Infrastructures

Integrated Risk Management (IRM)
Growing Intersection of Geopolitics and Cybersecurity

Security Training, VerSprite Security Resources
Preparing Your Microsoft Office 365 Environment for Forensic Analysis

VerSprite Security Resources, Webinars
Back to Basics: Finding Clarity in General Data Protection Regulation (GDPR) Compliance

Threat & Vulnerability Management
NTML Passwords Insecure

Subscribe for Our
Updates
Please enter your email address and receive the latest updates