SECURITY RESOURCES
Offensive minded security exploit development
Application Security, Threat Modeling
Risk Centric Threat Models for Internet of Things (IoT) & Medical Devices
Digital Forensics & Incident Response
Why Threat Hunting Should Be Included in Your Mergers & Acquisitions Playbook
Data Privacy & Development of Security Policies, Security Operations
Adding and Using JEA in Your Windows Environment
Threat Modeling, VerSprite Security Resources, Videos
AppSec EU 2017: Modeling Threats for Applications
Application Security, Governance Risk & Compliance, Information Security Management System (ISMS)
SSL/TLS Security – A Simplified, Quick Guide
VerSprite Security Resources
Risk-Centric Application Threat Models
Threat & Vulnerability Management
Unknown jQuery-File-Upload Vulnerability Used for Years
VerSprite Security Resources
Risk Centric Application Threat Modeling | NYC OWASP 2016
Possible Use Cases, VerSprite Security Resources
Hospitality Client Hoping to Avoid Controversy
VerSprite Security Resources
Assessing a Potential Mining Project Partner
Slides & Presentations, VerSprite Security Resources
Attack Trees Vignettes for Containers as a Service (CaaS) – AppSec EU 2016
Slides & Presentations, VerSprite Security Resources
Attack Trees for Containers as a Service (CaaS)
Slides & Presentations, Threat Modeling, VerSprite Security Resources
Organizational Threat Models – Atlanta Cyber Security Summit 2016
Threat Modeling, VerSprite Security Resources, Videos
CRESTCON 2019: Threat Modeling for Defense and Offense
Slides & Presentations, VerSprite Security Resources
Maturing 3rd Party Vendor Risk Programs
Subscribe for Our
Updates
Please enter your email address and receive the latest updates