SECURITY RESOURCES
Offensive minded security exploit development
VerSprite Security Resources, Webinars
Role of Zero Trust in Future Enterprise Security
Application Security, Threat Modeling
Risk Centric Threat Models for Internet of Things (IoT) & Medical Devices
Digital Forensics & Incident Response
Why Threat Hunting Should Be Included in Your Mergers & Acquisitions Playbook
Data Privacy & Development of Security Policies, Security Operations
Adding and Using JEA in Your Windows Environment
Threat Modeling, VerSprite Security Resources, Videos
AppSec EU 2017: Modeling Threats for Applications
Application Security, Governance Risk & Compliance, Information Security Management System (ISMS)
SSL/TLS Security – A Simplified, Quick Guide
VerSprite Security Resources
Risk-Centric Application Threat Models
Threat & Vulnerability Management
Unknown jQuery-File-Upload Vulnerability Used for Years
VerSprite Security Resources
Risk Centric Application Threat Modeling | NYC OWASP 2016
Possible Use Cases, VerSprite Security Resources
Hospitality Client Hoping to Avoid Controversy
VerSprite Security Resources
Assessing a Potential Mining Project Partner
Slides & Presentations, VerSprite Security Resources
Attack Trees Vignettes for Containers as a Service (CaaS) – AppSec EU 2016
Slides & Presentations, VerSprite Security Resources
Attack Trees for Containers as a Service (CaaS)
Slides & Presentations, Threat Modeling, VerSprite Security Resources
Organizational Threat Models – Atlanta Cyber Security Summit 2016
Threat Modeling, VerSprite Security Resources, Videos
CRESTCON 2019: Threat Modeling for Defense and Offense
Subscribe for Our
Updates
Please enter your email address and receive the latest updates