When it comes to vendor risk, what are the pros and cons of product and custom managed services? Which is better for your organization? Download the guide to learn what to consider in your decision process.
The latest talk in managing security programs is the ability to make “shift left” in terms of implementing controls. Learn how DevSecOps efforts are changing how we govern security controls via greater automation tools that are readily available to leverage.
In this case study of OS X digital forensics, we were tasked to recover the version history of documents created using Apple’s TextEdit application. It began with a request for us to recover the version history of documents created using Apple’s TextEdit application.
The global healthcare sector suffers more breaches than any other industry; in 2018, it accounted for approximately a quarter of the global total. This is not overly surprising; healthcare has always been an attractive target for malicious actors.
Man-in-The-Middle (MiTM) Attacks
When performing red teaming engagements, you typically have to assess the Wireless infrastructure used by the target in an attempt to find a way to set foot on their network infrastructure, and then search for completing your goals (which usually include obtaining sensitive business data or accessing critical systems).
Enterprise Data Security
Verizon’s 2019 Data Breach Investigations Report (DBIR), an industry benchmark for trends in cybersecurity, validates the growing intersection of geopolitics and cybersecurity. Two particular insights in the data driven report highlight how geopolitics continues to shape the threat landscape faced by businesses.
Hashcat is the world’s fastest and most advanced password recovery utility. This software on its 6.0.0 beta version can now crack an eight-character Windows NTLM password hash under 2 hours 30 minutes.
Web App Security
Security researchers at RIPS Technologies GmbH have published research about a critical remote command execution (RCE) in WordPress 5.0. This issue affects all the previous released versions in the past 6 years.
In this blog post we will take a deeper dive into exactly how to approach integrating security into your Software Development LifeCycle (SDLC). In addition, we will delve into one available resource that provides guidance on how to get started.
We are an international squad of professionals working as one.
Copyright 2019 VerSprite - All Rights Reserved