SECURITY RESOURCES
Offensive minded security exploit development
VerSprite Security Resources, Videos, Webinars
Effective Cybersecurity Planning Starts and Ends in the Boardroom
VerSprite Security Resources, Videos
How to Spot Phishing Attacks as a Remote Employee
Security Training, VerSprite Security Resources, Videos
Security Considerations for Remote IT Staff
In The News, VerSprite Security Resources, Videos
ATL Channel 2 News Interviews VerSprite CEO on Security Gaps Found in DeKalb Data Center
In The News, VerSprite Security Resources, Videos
Georgia Tech Data Breach: VerSprite Interviewed on Threat Motives
VerSprite Security Resources, Videos
Secure Development of Payment Applications
VerSprite Security Resources, Videos
Deep Dive into the Dalvik Virtual Machine’s JIT Implementation
VerSprite Security Resources, Videos
[Video] Abusing Insecure WCF Endpoints
VerSprite Security Resources, Videos
Fixing Threat Models with OWASP Efforts
Threat Modeling, VerSprite Security Resources, Videos
AppSec EU 2017: Modeling Threats for Applications
Threat Modeling, VerSprite Security Resources, Videos
CRESTCON 2019: Threat Modeling for Defense and Offense
VerSprite Security Resources, Videos, Webinars
Cyber Liability Insurance and Your Security Program – How They Fit
Cloud Security, VerSprite Security Resources, Videos
WD My Cloud Command Injection – Access All Private Folders
Cloud Security, VerSprite Security Resources, Videos
WD My Cloud Command Injection – Remote Root with WebRTC
VerSprite Security Resources, Videos
Error 500 | Exceptions That Will Get You Owned – BSidesATL 2013
Subscribe for Our
Updates
Please enter your email address and receive the latest updates