Home | Resources
VerSprite emulates realistic cyber attacks by a malicious actor using PASTA Threat Modeling (Process for Attack Simulation and Threat Analysis). Our risk-based threat modeling methodology consists of 7 stages for simulating cyber attacks and analyzing threats to the organization and application. This allows our pentesters, redteamers, and cybersecurity analysts to help your organization identify critical vulnerabilities and minimize real-world risks associated business impact. Learn More →
vietnam government supply chain attack
Vietnam’s government is the latest victim in a string of complex supply chain attacks. This attack targeted the VGCA using a backdoor trojan called PhantomNet. VerSprite’s Threat Intelligence team give a brief overview of the important details you need to know.
Learn more
Bethany Keele
threat modeling
Sit back and listen to part 2 of our discussion on FireEye’s breach, SolarWinds Sunburst supply chain attack. We’ll cover updates, how to protect against supply chain attacks with organizational threat models, and debate on the risks and benefits of an open disclosure community.
VerSprite
supply chain risk
Why are supply chains a popular target for cybercriminals? VerSprite CEO, Tony UcedaVélez, introduces our risk-based threat modeling approach, PASTA, and how it allows organizations to better protect their supply chain software from threat actors.
geopolitical risk webinar
What are the geopolitical risks of physical and digital supply chain attacks to your organization? Join VerSprite and CLASS-LLC in a webinar on the top risks and mitigation strategies to use in 2020.
GPR VerSprite
Back to Resources
We are an international squad of professionals working as one.
Email
Phone