Home | Resources
VerSprite emulates realistic cyber attacks by a malicious actor using PASTA Threat Modeling (Process for Attack Simulation and Threat Analysis). Our risk-based threat modeling methodology consists of 7 stages for simulating cyber attacks and analyzing threats to the organization and application. This allows our pentesters, redteamers, and cybersecurity analysts to help your organization identify critical vulnerabilities and minimize real-world risks associated business impact. Learn More →
Software Development Lifecycle (SDLC)
In this blog post we will take a deeper dive into exactly how to approach integrating security into your Software Development LifeCycle (SDLC). In addition, we will delve into one available resource that provides guidance on how to get started.
Learn more
VerSprite
basic osint
Open-source information is available through major search engines, but not limited to the websites, databases, and files which Google indexes, Yahoo, Bing, or others. Most information found on “deep web” and “dark web” is considered open source.
Jesse Zamarripa
Static Analysis Security Testing SAST
In this tutorial, VerSprite’s DevOps team walks you through how to automate SAST into your CI/CD pipeline
Mark Rood and Lara Ares
Enterprise Data Security
Our free, 4-part cybersecurity video training series walks you through how to stay safe online when working from home. This series is perfect for businesses that are moving employees to remote work.
Social Engineering
[Video 1] How secure are your surroundings while working outside your company’s office? In this free training video, we’ll teach you important security precautions to consider while working at home or in a public space.
April Brown
Privacy Risk
[Video 2] In this free security training video, we’ll discuss how to better protect your home network while you work remotely. Also, find out what home office devices may be putting your sensitive company data at risk.
[Video 3] Phishing emails, Vishing, and fake websites are easy ways malicious threat actors take advantage of remote employees. In this free training video, learn key indicators for identifying and avoiding phishing attacks.
Google Security
[Video 4] As a remote IT or tech professional, it’s important to maintain your company’s cybersecurity posture. This free video will give you tips to create new security protocols while employees work from home, including VPN patching and communication.
Continuous Integration & Continuous Delivery (CI/CD)
Greg Mosher
Back to Resources
We are an international squad of professionals working as one.
Email
Phone