SECURITY RESOURCES
Offensive minded security exploit development
VerSprite Security Resources, Videos
Fixing Threat Models with OWASP Efforts

Application Security, Governance Risk & Compliance
Swimming in the Deep End: Taking a Deeper Look at the Use Cases of JEA

Application Security, Mobile Security Testing, Security Research
Frida Engage Part One | Building an ELF Parser with Frida

VerSprite Security Resources, Webinars
Role of Zero Trust in Future Enterprise Security

Application Security, Threat Modeling
Risk Centric Threat Models for Internet of Things (IoT) & Medical Devices

Digital Forensics & Incident Response
Why Threat Hunting Should Be Included in Your Mergers & Acquisitions Playbook

Data Privacy & Development of Security Policies, Security Operations
Adding and Using JEA in Your Windows Environment

Threat Modeling, VerSprite Security Resources, Videos
AppSec EU 2017: Modeling Threats for Applications

Application Security, Governance Risk & Compliance, Information Security Management System (ISMS)
SSL/TLS Security – A Simplified, Quick Guide

VerSprite Security Resources
Risk-Centric Application Threat Models

Threat & Vulnerability Management
Unknown jQuery-File-Upload Vulnerability Used for Years

VerSprite Security Resources
Risk Centric Application Threat Modeling | NYC OWASP 2016

Possible Use Cases, VerSprite Security Resources
Hospitality Client Hoping to Avoid Controversy

VerSprite Security Resources
Assessing a Potential Mining Project Partner

Slides & Presentations, VerSprite Security Resources
Attack Trees Vignettes for Containers as a Service (CaaS) – AppSec EU 2016

Subscribe for Our
Updates
Please enter your email address and receive the latest updates