SECURITY RESOURCES
Offensive minded security exploit development
Digital Forensics & Incident Response
Understand Digital Forensics & Incident Response (DFIR)
Data Privacy & Development of Security Policies, Governance Risk & Compliance, Integrated Risk Management (IRM)
Gig Economy & Growing Security Gaps
Application Security, Digital Forensics & Incident Response, Governance Risk & Compliance
Phishing Site Uses Google Translate
In The News, VerSprite Security Resources, Videos
Georgia Tech Data Breach: VerSprite Interviewed on Threat Motives
Application Security, Threat & Vulnerability Management
Critical Google Chrome Security Issue
Information Security Management System (ISMS), Integrated Risk Management (IRM)
Interactive Simulations: Risk Management That Is Greater Than the Sum of Its Parts
Application Security, Threat & Vulnerability Management
Why Google Automatic Sign-in is a Privacy Risk
Security Awareness, Security Research
Exploitation of Remote WCF Vulnerabilities
Geopolitical Risk, VerSprite Security Resources, Webinars
The Geopolitical Dimensions of Automating Security
Digital Forensics & Incident Response, Threat & Vulnerability Management
Can You Spot When You’re Being Phished?
Application Security, Security Training
TLS 1.3 and Major TLS Libraries Vulnerable
Governance Risk & Compliance
Vendor Risk: Coverage, Speed, Risk Relevance & Integration
Threat & Vulnerability Management
PHP 5.6 End of Life (EOL): Upgrade to Stable Version of PHP
Integrated Risk Management (IRM)
Podcast: Cyber-Geopolitics and the Role of Data
Integrated Risk Management (IRM)
Disappearing Dissidents – Powered by Tech
Subscribe for Our
Updates
Please enter your email address and receive the latest updates