SECURITY RESOURCES
Offensive minded security exploit development
Geopolitical Risk, Possible Use Cases, VerSprite Security Resources
US Company Exploring FinTech
Geopolitical Risk, Possible Use Cases, VerSprite Security Resources
Modernizing the Telecommunications Industry
Slides & Presentations, VerSprite Security Resources
Risk Centric Threat Modeling: AppSec, Risk, Compliance Convergence | CSX North American Conference
Slides & Presentations, Threat Modeling, VerSprite Security Resources
Healthcare Threat Modeling Vignettes
Governance Risk & Compliance, Information Security Management System (ISMS), Regulatory Compliance
Medical Record Retention Across States (HIPAA / HITECH)
Cloud Security, VerSprite Security Resources, Videos
WD My Cloud Command Injection – Access All Private Folders
Application Security, Cloud Security, Information Security Management System (ISMS)
Command Injection in the WD My Cloud NAS
Cloud Security, VerSprite Security Resources, Videos
WD My Cloud Command Injection – Remote Root with WebRTC
Application Security, Governance Risk & Compliance, Information Security Management System (ISMS), Regulatory Compliance
Anti-Nausea Medicine for LastPass, Password Management FUD
Application Security, Threat Modeling
Why Threat Free Threat Modeling Doesn’t Work
Application Security, Information Security Management System (ISMS)
Assessing Emerging JavaScript Platforms with Express.js and Node.js – What to Look For
Governance Risk & Compliance, Information Security Management System (ISMS)
Security Metrics Rehab – Part One
Slides & Presentations, VerSprite Security Resources
PASTA Threat Modeling – One Day Training
Threat & Vulnerability Management
The Truth About Chinese Hardware Implants
Slides & Presentations, Threat Modeling, VerSprite Security Resources
Addressing Cybercrime via PASTA Threat Modeling
Subscribe for Our
Updates
Please enter your email address and receive the latest updates