SECURITY RESOURCES
Offensive minded security exploit development
Application Security, OffSec
Grey Box Application Testing: What It Is and Why You Need It
Security Training
VerSprite and AppSecEngineer Partner to Operationalize Security Training
Integrated Risk Management (IRM), News
Nordstream Pipelines Attacks
eBook, Integrated Risk Management (IRM)
Envisions Geopolitical Threat Report:
Data Privacy & Development of Security Policies, Governance Risk & Compliance
Turn Data *Mis*Management into Data Security
Governance Risk & Compliance, Security Awareness
Domain Spoofing and Phishing Attacks
OffSec, Regulatory Compliance
PCI DSS 4.0: What You Need to Know and What You Need to Do
OffSec
AI and Cybersecurity: Threats and Opportunities
eBook, Integrated Risk Management (IRM)
Welcome to The World of Geopolitics and Cybersecurity!
Threat Intelligence
Why Bad Guys Do Bad Things: How Maslow’s Hierarchy of Needs Can Help Identify Cyber Threats
eBook, Integrated Risk Management (IRM), Security Awareness
Analyzing the State of Cybersecurity at the End of 2022
Application Security, Security Research
Chrome Exploitation: How to easily launch a Chrome RCE+SBX exploit chain with one command
Security Research, Threat & Vulnerability Management
Printer Spooler Bug Research
Red Teaming and Social Engineering, VerSprite Security Resources
Digital AdTech Firm’s CTO Focuses on Strategic Cybersecurity Alliances to Build Resiliency for Digital Turbine
Security Research, Threat & Vulnerability Management
Windows Kernel Drive Vulnerability Research: CVE-2020-17087
Subscribe for Our
Updates
Please enter your email address and receive the latest updates