SECURITY RESOURCES
Offensive minded security exploit development
Data Privacy & Development of Security Policies, Governance Risk & Compliance, Regulatory Compliance
Incident Response: When The General Data Protection Regulation (GDPR) Requires Action
Threat Modeling, VerSprite Security Resources
Building a Valid Threat Library for Cloud-Based Applications
Threat & Vulnerability Management
Identity and Access Management in Amazon Web Services (AWS)
Geopolitical Risk, Reports, VerSprite Security Resources
The Huawei Hoopla: ICTs, Chinese Tech, and the Need for Geo-Cyber Strategy
Digital Forensics & Incident Response
Understand Digital Forensics & Incident Response (DFIR)
Data Privacy & Development of Security Policies, Governance Risk & Compliance, Integrated Risk Management (IRM)
Gig Economy & Growing Security Gaps
Application Security, Digital Forensics & Incident Response, Governance Risk & Compliance
Phishing Site Uses Google Translate
In The News, VerSprite Security Resources, Videos
Georgia Tech Data Breach: VerSprite Interviewed on Threat Motives
Application Security, Threat & Vulnerability Management
Critical Google Chrome Security Issue
Information Security Management System (ISMS), Integrated Risk Management (IRM)
Interactive Simulations: Risk Management That Is Greater Than the Sum of Its Parts
Application Security, Threat & Vulnerability Management
Why Google Automatic Sign-in is a Privacy Risk
Security Awareness, Security Research
Exploitation of Remote WCF Vulnerabilities
Geopolitical Risk, VerSprite Security Resources, Webinars
The Geopolitical Dimensions of Automating Security
Digital Forensics & Incident Response, Threat & Vulnerability Management
Can You Spot When You’re Being Phished?
Application Security, Security Training
TLS 1.3 and Major TLS Libraries Vulnerable
Subscribe for Our
Updates
Please enter your email address and receive the latest updates