SECURITY RESOURCES
Offensive minded security exploit development
Integrated Risk Management (IRM)
What is Geopolitical Risk & Why Do You Need It?

Information Security Management System (ISMS), Mobile Security Testing
Why Androids are a Prime Target for Hackers

Integrated Risk Management (IRM)
Cybersecurity & Geopolitical Risk: What Executives Need to Know

Red Teaming and Social Engineering, VerSprite Security Resources
Opening the Black Box of Payment Terminal Security

VerSprite Security Resources
Social Engineering Presentation

Security Awareness, Security Research
Abusing Insecure Windows Communication Foundation (WCF) Endpoints

VerSprite Security Resources, Videos
Secure Development of Payment Applications

Slides & Presentations, VerSprite Security Resources
Understanding Data Privacy in a Digital Age

VerSprite Security Resources, Videos
Deep Dive into the Dalvik Virtual Machine’s JIT Implementation

Slides & Presentations, VerSprite Security Resources
Going Back in Time to Abuse Android’s JIT

Slides & Presentations, VerSprite Security Resources
Oh the POSsibilities – BSides ATL 2018

Security Research
Frida Engage Part Three | You Down With XPC?

Security Research
Oh the POSsibilities – Point-Of-Sale Insecurity

Security Research
XML EXTERNAL ENTITY (XXE) Processing

Regulatory Compliance
HIPAA with the Security Experts

Subscribe for Our
Updates
Please enter your email address and receive the latest updates