SECURITY RESOURCES
Offensive minded security exploit development
Ebooks & Guides, Geopolitical Risk, Reports, VerSprite Security Resources
Geopolitical Risk Consulting: VerSprite Envisions 2019
Application Security, Penetration Testing
MiTM Attack Between Target Windows Machines and a DNS Server
Security Research
Windows Userland Application Attack Surface Enumeration
Threat & Vulnerability Management
libSSH Vulnerability: Do You Have to Worry?
Application Security, Cloud Security, Security Operations, Security Testing
How Hackers Can Attack Your Amazon Web Services (AWS) Resources
Slides & Presentations, VerSprite Security Resources, Webinars
Data Management: Best Practices for Security & Privacy
Integrated Risk Management (IRM)
The Aadhaar Biometric Database Saga
Threat & Vulnerability Management
A New Tool for Finding Open S3 Buckets
Integrated Risk Management (IRM)
No Shortcuts in Cybersecurity
Data Privacy & Development of Security Policies, Integrated Risk Management (IRM)
VerSprite Reacts: Aviation Scandal & Corporate Espionage
Integrated Risk Management (IRM)
VerSprite Reacts: Artificial Intelligence Security Vulnerabilities
Integrated Risk Management (IRM)
VerSprite Podcast: Threat Libraries in the Cloud
Data Privacy & Development of Security Policies, Integrated Risk Management (IRM)
VerSprite Reacts: Google+ Data Breach
Application Security, Data Privacy & Development of Security Policies
Google Thwarts Employee Phishing Attack
Threat & Vulnerability Management
Critical Vulnerability in Apache Struts2
Subscribe for Our
Updates
Please enter your email address and receive the latest updates