SECURITY RESOURCES
Offensive minded security exploit developmentERAs are Dead. Long Live the Organizational Threat Model!
The OTM is a 7-stage process, inspired by the application threat modeling methodology, PASTA, that is applied at an organizational level. Much like application threat models, the intent is to have risks proven by various important contexts – business impact, likelihood, and the effectiveness of native countermeasures (or controls) that help reduce inherent risk levels.
Watch NowCybersecurity Library, Ebooks & Guides, Threat Modeling, VerSprite Security Resources
The Process for Attack Simulation and Threat Analysis
PASTA is the Process for Attack Simulation & Threat Analysis and is a risk-centric threat modeling methodology aimed at identifying viable threat patterns against an application or system environment.
Watch NowIntegrating Threat Modeling Throughout Your Enterprise
In this model, you will see engineers, network professionals, developers, architects, business analysts, project managers, security champions, pentesters, and quality assurance engineers. Because they all have some level of involvement and collaboration at different stages of application, as well as organizational, threat modeling ensures effective results.
Watch NowCybersecurity Library, Ebooks & Guides, Supply Chains, VerSprite Security Resources
Using Risk-Based Threat Modeling to Protect Your Supply Chain
Why are supply chains a popular target for cybercriminals? VerSprite CEO, Tony UcedaVélez, introduces our risk-based threat modeling approach, PASTA, and how it allows organizations to better protect their supply chain software from threat actors.
Watch NowIs Using Public WiFi Safe?
Using public WiFi can leave you and your employees open to man-in-the-middle cyber attacks. With the increase of remote work, organizations must teach their employees how to stay safe on open WiFi networks. Get our tips on how to protect against hackers while on open WiFi networks.
Watch NowCategory
- All Resources
- Case Study
- Cloud Security
- Cybersecurity Library
- CyberWatch
- DevSecOps
- Ebooks & Guides
- Geopolitical Risk
- In The News
- Podcasts
- Possible Use Cases
- Red Teaming and Social Engineering
- Reports
- Research Advisories
- Security Products
- Security Testing
- Security Training
- Slides & Presentations
- Supply Chains
- Threat Modeling
- VerSprite Security Resources
- Videos
- Web Application Security
- Webinars
Subscribe for Our
Updates
Please enter your email address and receive the latest updates