SECURITY RESOURCES
Offensive minded security exploit development
Application Security, Digital Forensics & Incident Response, Governance Risk & Compliance
Phishing Site Uses Google Translate

In The News, VerSprite Security Resources, Videos
Georgia Tech Data Breach: VerSprite Interviewed on Threat Motives

Application Security, Threat & Vulnerability Management
Critical Google Chrome Security Issue

Information Security Management System (ISMS), Integrated Risk Management (IRM)
Interactive Simulations: Risk Management That Is Greater Than the Sum of Its Parts

Application Security, Threat & Vulnerability Management
Why Google Automatic Sign-in is a Privacy Risk

Security Awareness, Security Research
Exploitation of Remote WCF Vulnerabilities

Geopolitical Risk, VerSprite Security Resources, Webinars
The Geopolitical Dimensions of Automating Security

Digital Forensics & Incident Response, Threat & Vulnerability Management
Can You Spot When You’re Being Phished?

Application Security, Security Training
TLS 1.3 and Major TLS Libraries Vulnerable

Governance Risk & Compliance
Vendor Risk: Coverage, Speed, Risk Relevance & Integration

Threat & Vulnerability Management
PHP 5.6 End of Life (EOL): Upgrade to Stable Version of PHP

Integrated Risk Management (IRM)
Podcast: Cyber-Geopolitics and the Role of Data

Integrated Risk Management (IRM)
Disappearing Dissidents – Powered by Tech

Application Security, Information Security Management System (ISMS)
VerSprite Earns CREST Certification

Security Awareness, Security Research
Hacking an Aftermarket Remote Start System

Subscribe for Our
Updates
Please enter your email address and receive the latest updates