Information Security Resources & Cybersecurity Research | VerSprite Blog Information Security Resources & Cybersecurity Research | VerSprite Blog

Home  |  Resources

VerSprite Security Resources

Literary Antidotes for Today's Security Snake Oil

VerSprite Reacts: Aviation Scandal & Corporate Espionage

Global Threats

Corporate espionage is not a new phenomenon, but dependence on tech, and the ability of corporate spies to steal large amounts of information much faster now than in the past, poses new challenges for firms looking to safeguard intellectual property and sensitive data.

VerSprite Reacts: Managing Global Risks of Emerging AI Technology

Data Security Breach

Increasingly sophisticated artificial intelligence (AI) capabilities make headlines daily. AI also comes with a range of security vulnerabilities, some of which can exacerbate a company’s exposure not only to cybersecurity issues, but also geopolitical risk.

VerSprite Podcast: Threat Libraries in the Cloud

Cybersecurity

Tony started VerSprite with the idea of developing a team of ‘security hybrids’​ – consummate security professionals that personify both technical mastery around emerging technologies and associated threats.

VerSprite Reacts: Google+ Data Breach 

Enterprise Data Security

Revelations of a massive breach of Google+, a largely defunct challenger to Facebook, suggests that the data of hundreds of thousands of users was compromised over a period from 2015 to March 2018.

Google Thwarts Employee Phishing Attack

Phishing Attacks

With network perimeters becoming more hardened, phishing is an ever-popular way for attackers to gain a foothold into a company network. VerSprite’s own experience with phishing engagements show us just how effective and easy it is to run successful phishing campaigns.

Critical Vulnerability in Apache Struts2

Cybersecurity

A critical security flaw in Apache Struts2 makes it possible for a cyber attacker to remotely execute code on the vulnerable server and can provide and entry point into your network. Proof of Concept code is already available online for hackers to use and modify to initiate attacks.

We are an international squad of professionals working as one.

logos