SECURITY RESOURCES
Offensive minded security exploit developmentERAs are Dead. Long Live the Organizational Threat Model!
The OTM is a 7-stage process, inspired by the application threat modeling methodology, PASTA, that is applied at an organizational level. Much like application threat models, the intent is to have risks proven by various important contexts – business impact, likelihood, and the effectiveness of native countermeasures (or controls) that help reduce inherent risk levels.
Watch NowCybersecurity Library, Ebooks & Guides, Threat Modeling, VerSprite Security Resources
The Process for Attack Simulation and Threat Analysis
PASTA is the Process for Attack Simulation & Threat Analysis and is a risk-centric threat modeling methodology aimed at identifying viable threat patterns against an application or system environment.
Watch NowA Look at RACI Models within Application Threat Modeling
In this model, you will see engineers, network professionals, developers, architects, business analysts, project managers, security champions, pentesters, and quality assurance engineers. Because they all have some level of involvement and collaboration at different stages of application, as well as organizational, threat modeling ensures effective results.
Watch NowCybersecurity Library, Ebooks & Guides, Supply Chains, VerSprite Security Resources
Using Risk-Based Threat Modeling to Protect Your Supply Chain
Why are supply chains a popular target for cybercriminals? VerSprite CEO, Tony UcedaVélez, introduces our risk-based threat modeling approach, PASTA, and how it allows organizations to better protect their supply chain software from threat actors.
Watch NowIs Using Public WiFi Safe?
Using public WiFi can leave you and your employees open to man-in-the-middle cyber attacks. With the increase of remote work, organizations must teach their employees how to stay safe on open WiFi networks. Get our tips on how to protect against hackers while on open WiFi networks.
Watch NowCategory
- All Resources
- AI
- Application Security
- Awards
- Case Study
- Cloud Security
- Cloud Security
- Cybersecurity Library
- CyberWatch
- Data Privacy & Development of Security Policies
- DevSecOps
- DevSecOps
- Digital Forensics & Incident Response
- eBook
- Ebooks & Guides
- Geopolitical Risk
- Geopolitical Risk
- Governance Risk & Compliance
- In The News
- In The News
- Information Security Management System (ISMS)
- Managed Security
- Mobile Security Testing
- News
- OffSec
- Penetration Testing
- Podcasts
- Possible Use Cases
- Red Teaming and Social Engineering
- Red Teaming and Social Engineering
- Regulatory Compliance
- Reports
- Reports
- Research Advisories
- Risk Assessments
- Security Awareness
- Security Operations
- Security Products
- Security Research
- Security Testing
- Security Testing
- Security Training
- Security Training
- Slides & Presentations
- Software Composition Analysis
- Supply Chains
- Supply Chains
- Threat & Vulnerability Management
- Threat Intelligence
- Threat Modeling
- Threat Modeling
- VerSprite Security Resources
- Videos
- Virtual Security Operations Center vSOC
- Web Application Security
- Webinars
Subscribe for Our
Updates
Please enter your email address and receive the latest updates