SECURITY RESOURCES
Offensive minded security exploit development![Effective Cybersecurity Planning Starts and Ends in the Boardroom](https://versprite.com/wp-content/uploads/2020/12/boardroom-1-1024x576.png)
VerSprite Security Resources, Videos, Webinars
Effective Cybersecurity Planning Starts and Ends in the Boardroom
![How to Spot Phishing Attacks as a Remote Employee](https://versprite.com/wp-content/uploads/2020/04/phishing-remote-work-1024x576.png)
VerSprite Security Resources, Videos
How to Spot Phishing Attacks as a Remote Employee
![Security Considerations for Remote IT Staff](https://versprite.com/wp-content/uploads/2020/04/remote-IT-1024x576.png)
Security Training, VerSprite Security Resources, Videos
Security Considerations for Remote IT Staff
![ATL Channel 2 News Interviews VerSprite CEO on Security Gaps Found in DeKalb Data Center](https://versprite.com/wp-content/uploads/2019/09/dekalb-county-data-center-1024x576.png)
In The News, VerSprite Security Resources, Videos
ATL Channel 2 News Interviews VerSprite CEO on Security Gaps Found in DeKalb Data Center
![Georgia Tech Data Breach: VerSprite Interviewed on Threat Motives](https://versprite.com/wp-content/uploads/2019/04/cybersecurity-threat-1024x576.png)
In The News, VerSprite Security Resources, Videos
Georgia Tech Data Breach: VerSprite Interviewed on Threat Motives
![Secure Development of Payment Applications](https://versprite.com/wp-content/uploads/2018/05/secure-development-of-payment-applications-1024x576.png)
VerSprite Security Resources, Videos
Secure Development of Payment Applications
![Deep Dive into the Dalvik Virtual Machine’s JIT Implementation](https://versprite.com/wp-content/uploads/2018/04/Dalvik-Virtual-Machines-JIT-1024x576.png)
VerSprite Security Resources, Videos
Deep Dive into the Dalvik Virtual Machine’s JIT Implementation
![[Video] Abusing Insecure WCF Endpoints](https://versprite.com/wp-content/uploads/2018/09/insecure-windows-communication-1024x576.png)
VerSprite Security Resources, Videos
[Video] Abusing Insecure WCF Endpoints
![Fixing Threat Models with OWASP Efforts](https://versprite.com/wp-content/uploads/2017/11/Fixing-Threat-Models-1024x576.png)
VerSprite Security Resources, Videos
Fixing Threat Models with OWASP Efforts
![AppSec EU 2017: Modeling Threats for Applications](https://versprite.com/wp-content/uploads/2017/05/Threat-Modeling-with-PASTA-1024x576.png)
Threat Modeling, VerSprite Security Resources, Videos
AppSec EU 2017: Modeling Threats for Applications
![CRESTCON 2019: Threat Modeling for Defense and Offense](https://versprite.com/wp-content/uploads/2016/03/CRESTCon-risk-centric-threat-modeling-1024x576.png)
Threat Modeling, VerSprite Security Resources, Videos
CRESTCON 2019: Threat Modeling for Defense and Offense
![Cyber Liability Insurance and Your Security Program – How They Fit](https://versprite.com/wp-content/uploads/2016/02/Cyber-Liability-1024x576.png)
VerSprite Security Resources, Videos, Webinars
Cyber Liability Insurance and Your Security Program – How They Fit
![WD My Cloud Command Injection – Access All Private Folders](https://versprite.com/wp-content/uploads/2015/09/WD-My-Cloud-Injection-1024x576.png)
Cloud Security, VerSprite Security Resources, Videos
WD My Cloud Command Injection – Access All Private Folders
![WD My Cloud Command Injection – Remote Root with WebRTC](https://versprite.com/wp-content/uploads/2015/09/Western-Digital-My-Cloud-Command-Injection-1024x576.png)
Cloud Security, VerSprite Security Resources, Videos
WD My Cloud Command Injection – Remote Root with WebRTC
![Error 500 | Exceptions That Will Get You Owned – BSidesATL 2013](https://versprite.com/wp-content/uploads/2013/11/error-500-1024x576.png)
VerSprite Security Resources, Videos
Error 500 | Exceptions That Will Get You Owned – BSidesATL 2013
![ci cd security, devsecops ci/cd](https://versprite.com/wp-content/uploads/2022/11/hero-img-02.jpg)
Subscribe for Our
Updates
Please enter your email address and receive the latest updates