Unsafe Application State Restoration actually mean essentially means a mobile application saves the state of a view location that is only presented to…
Statistical Findings & Security Metrics
This presentations covers Application Security on a Dime: Open Tech, Tools, and Techniques for Running a Blossoming InfoSec Program.
Lately I have been really interested in XML serialization vulnerabilities. There has already been some eye opening research into the vulnerabilities…
Enterprise Data Security
Metaphorically speaking, force-feeding enterprise security solutions translates to the persistent push of the latest security products and solutions.
This talk is about vulnerabilities discovered for Java Web Application Frameworks, leading to Error 500, their impact, and why they are never low risk.
PASTA Threat Modeling
Today’s application assessment options are both misunderstood and misapplied when assessing web applications or any application environment. Often times, traditional security tools and testing methods seem to compete with one another instead of supporting a common goal.
STIX Format Data
In part two of VerSprite’s STIX series, we will dive into how cyber campaigns and cyber attacks can provide vital intel on geopolitical risks and cybersecurity risks, especially when using the STIX II data format. We will also explain how the intel provided by cyber campaigns can be beneficial to a variety of security professionals in both the private and government sectors.
We are an international squad of professionals working as one.
Copyright 2020 VerSprite - All Rights Reserved