< Back to Blog Home
Aadhaar was developed in 2009 by the Unique Identification Authority of India to address a country-wide problem: the lack of a standard means of verifying identities for the purposes of distributing government benefits and collecting taxes.
Among the elements included in the analysis was a comprehensive survey of existing infrastructure, the limitations of existing legal and regulatory frameworks and the potential dangers associated with being part of an initial wave of infrastructure investment.
PASTA Threat Modeling
Tony started VerSprite with the idea of developing a team of ‘security hybrids’ – consummate security professionals that personify both technical mastery around emerging technologies and associated threats.
Data Security Breach
VerSprite’s resident Privacy expert, Sarah Powers, demystifies GDPR’s fundamental principles, breaking it down into the basics you need to understand GDPR compliance.
VerSprite’s Director of Security Research, Ben Watson, takes a deep dive into the Dalvik Virtual Machine’s JIT implementation and how it can be used and abused to execute shellcode.
This presentation looks at PASTA, the only risk centric application threat modeling methodology for applications of any architecture/deployment type.
We are an international squad of professionals working as one.
Copyright 2018 VerSprite - All Rights Reserved