SECURITY RESOURCES
Offensive minded security exploit development
VerSprite Security Resources, Videos, Webinars
Effective Cybersecurity Planning Starts and Ends in the Boardroom

VerSprite Security Resources, Videos
How to Spot Phishing Attacks as a Remote Employee

Security Training, VerSprite Security Resources, Videos
Security Considerations for Remote IT Staff

In The News, VerSprite Security Resources, Videos
ATL Channel 2 News Interviews VerSprite CEO on Security Gaps Found in DeKalb Data Center

In The News, VerSprite Security Resources, Videos
Georgia Tech Data Breach: VerSprite Interviewed on Threat Motives

VerSprite Security Resources, Videos
Secure Development of Payment Applications

VerSprite Security Resources, Videos
Deep Dive into the Dalvik Virtual Machine’s JIT Implementation
![[Video] Abusing Insecure WCF Endpoints](https://versprite.com/wp-content/uploads/2018/09/insecure-windows-communication-1024x576.png)
VerSprite Security Resources, Videos
[Video] Abusing Insecure WCF Endpoints

VerSprite Security Resources, Videos
Fixing Threat Models with OWASP Efforts

Threat Modeling, VerSprite Security Resources, Videos
AppSec EU 2017: Modeling Threats for Applications

Threat Modeling, VerSprite Security Resources, Videos
CRESTCON 2019: Threat Modeling for Defense and Offense

VerSprite Security Resources, Videos, Webinars
Cyber Liability Insurance and Your Security Program – How They Fit

Cloud Security, VerSprite Security Resources, Videos
WD My Cloud Command Injection – Access All Private Folders

Cloud Security, VerSprite Security Resources, Videos
WD My Cloud Command Injection – Remote Root with WebRTC

VerSprite Security Resources, Videos
Error 500 | Exceptions That Will Get You Owned – BSidesATL 2013

Subscribe for Our
Updates
Please enter your email address and receive the latest updates