VerSprite's Resource Library
Subscribe
Global Threats
Cybersecurity and geopolitics are inextricably linked. To holistically tackle threats to our information security, we must take a step back and examine their causal roots and drivers, which take place day after day on the international stage.
Read more
Versprite
Attack Surface
The Android operating system and the mobile devices it runs on dominate the market in comparison to other device manufactures. Along with the market share, the Android ecosystem is heavily fragmented; that is to say many individuals are still using older versions of the Android operating system.
Security Vulnerabilities
In October 2018, it was revealed that there existed an authentication bypass vulnerability in the libSSH library. This immediately gained attention of the InfoSec media, which started throwing around wild speculations about its scope and impact.
Amazon Web Services
Stolen credentials remain the number one action in cybersecurity breaches. However, attackers still have other routes to your systems and data. Once you secure your AWS IAM, where do you focus next? In this piece we will look at securing AWS resources that can be attacked directly through the network.
Greg Mosher
Security Controls
This presentation revisits both traditional governance best practices that are still invaluable to proper data management and governance efforts, as well as practical technological controls that can support the management of data.
Tony UcedaVélez
Privacy Risk
Aadhaar was developed in 2009 by the Unique Identification Authority of India to address a country-wide problem: the lack of a standard means of verifying identities for the purposes of distributing government benefits and collecting taxes.
Milena Rodban
Multi-Factor Authentication
This blog post reviews best practices and pro tips for using Amazon Web Services securely, Identity and Access Management, and the risks faced when not setup correctly.
Enterprise Data Security
Open web directories have long been a target of hackers looking for cheap wins in the search for sensitive data. Today, open S3 buckets are becoming a new favorite source for discovering data sitting on the public internet.
Zach Varnell
Following recent news reports of substantial data breaches, devastating leaks, and even savvy executives falling prey to phishing attacks, there is renewed interest in making sure that people are protected when they use their devices.
Geopolitical Risk Assessment
Assessment of risks related to modernizing the telecommunications industry in Iran, following the anticipated removal of sanctions.
Cybersecurity
Corporate espionage is not a new phenomenon, but dependence on tech, and the ability of corporate spies to steal large amounts of information much faster now than in the past, poses new challenges for firms looking to safeguard intellectual property and sensitive data.
Increasingly sophisticated artificial intelligence (AI) capabilities make headlines daily. AI also comes with a range of security vulnerabilities, some of which can exacerbate a company’s exposure not only to cybersecurity issues, but also geopolitical risk.
We are an international squad of professionals working as one.
Email
Phone