SECURITY RESOURCES
Offensive minded security exploit development![Fixing Threat Models with OWASP Efforts](https://versprite.com/wp-content/uploads/2017/11/Fixing-Threat-Models-1024x576.png)
VerSprite Security Resources, Videos
Fixing Threat Models with OWASP Efforts
![Swimming in the Deep End: Taking a Deeper Look at the Use Cases of JEA](https://versprite.com/wp-content/uploads/2017/10/Use-Cases-of-JEA-1024x576.png)
Application Security, Governance Risk & Compliance
Swimming in the Deep End: Taking a Deeper Look at the Use Cases of JEA
![Role of Zero Trust in Future Enterprise Security](https://versprite.com/wp-content/uploads/2017/09/zero-trust-security-model-1024x576.png)
VerSprite Security Resources, Webinars
Role of Zero Trust in Future Enterprise Security
![Risk Centric Threat Models for Internet of Things (IoT) & Medical Devices](https://versprite.com/wp-content/uploads/2017/09/iot-based-medical-devices-1024x576.png)
Application Security, Threat Modeling
Risk Centric Threat Models for Internet of Things (IoT) & Medical Devices
![Why Threat Hunting Should Be Included in Your Mergers & Acquisitions Playbook](https://versprite.com/wp-content/uploads/2017/08/threat-hunting-2-1024x576.png)
Digital Forensics & Incident Response
Why Threat Hunting Should Be Included in Your Mergers & Acquisitions Playbook
![Adding and Using JEA in Your Windows Environment](https://versprite.com/wp-content/uploads/2017/06/Using-JEA-in-Your-Windows-Environment-1024x576.png)
Data Privacy & Development of Security Policies, Security Operations
Adding and Using JEA in Your Windows Environment
![AppSec EU 2017: Modeling Threats for Applications](https://versprite.com/wp-content/uploads/2017/05/Threat-Modeling-with-PASTA-1024x576.png)
Threat Modeling, VerSprite Security Resources, Videos
AppSec EU 2017: Modeling Threats for Applications
![SSL/TLS Security – A Simplified, Quick Guide](https://versprite.com/wp-content/uploads/2017/05/SSLTLS-Security-1024x576.png)
Application Security, Governance Risk & Compliance, Information Security Management System (ISMS)
SSL/TLS Security – A Simplified, Quick Guide
![Risk-Centric Application Threat Models](https://versprite.com/wp-content/uploads/2016/12/Process-for-Attack-Simulation-Threat-Analysis-1024x576.png)
VerSprite Security Resources
Risk-Centric Application Threat Models
![Unknown jQuery-File-Upload Vulnerability Used for Years](https://versprite.com/wp-content/uploads/2016/12/jQuery-vulnerability-1024x576.png)
Threat & Vulnerability Management
Unknown jQuery-File-Upload Vulnerability Used for Years
![Risk Centric Application Threat Modeling | NYC OWASP 2016](https://versprite.com/wp-content/uploads/2016/12/risk-centric-threat-1024x576.png)
VerSprite Security Resources
Risk Centric Application Threat Modeling | NYC OWASP 2016
![Hospitality Client Hoping to Avoid Controversy](https://versprite.com/wp-content/uploads/2016/11/geopolitical-risks-in-hotel-industry-1024x576.png)
Possible Use Cases, VerSprite Security Resources
Hospitality Client Hoping to Avoid Controversy
![Assessing a Potential Mining Project Partner](https://versprite.com/wp-content/uploads/2016/11/mining-industry-risks-1024x576.png)
VerSprite Security Resources
Assessing a Potential Mining Project Partner
![Attack Trees Vignettes for Containers as a Service (CaaS) – AppSec EU 2016](https://versprite.com/wp-content/uploads/2016/07/Attack-Trees-Vignettes-1024x576.png)
Slides & Presentations, VerSprite Security Resources
Attack Trees Vignettes for Containers as a Service (CaaS) – AppSec EU 2016
![Attack Trees for Containers as a Service (CaaS)](https://versprite.com/wp-content/uploads/2016/05/attack-trees-for-containers-1024x576.png)
Slides & Presentations, VerSprite Security Resources
Attack Trees for Containers as a Service (CaaS)
![ci cd security, devsecops ci/cd](https://versprite.com/wp-content/uploads/2022/11/hero-img-02.jpg)
Subscribe for Our
Updates
Please enter your email address and receive the latest updates