SECURITY RESOURCES
Offensive minded security exploit development
Geopolitical Risk, Supply Chains, VerSprite Security Resources
A Geopolitical Perspective on Supply Chain Risks and Opportunities
What are the geopolitical risks of physical and digital supply chain attacks to your organization? Join VerSprite and CLASS-LLC in a webinar on the top risks and mitigation strategies to use in 2020.
Watch Now- All Resources
- Awards
- Case Study
- Cloud Security
- Cybersecurity Library
- Cyberwatch
- DevSecOps
- Digital Forensics & Incident Response
- Ebooks & Guides
- Geopolitical Risk
- In The News
- Podcasts
- Possible Use Cases
- Red Teaming and Social Engineering
- Reports
- Research Advisories
- Security Products
- Security Testing
- Security Training
- Slides & Presentations
- Supply Chains
- Threat Modeling
- VerSprite Security Resources
- Videos
- Web Application Security
- Webinars
VerSprite Security Resources, Videos, Webinars
Effective Cybersecurity Planning Starts and Ends in the Boardroom
VerSprite Security Resources, Videos
How to Spot Phishing Attacks as a Remote Employee
Security Training, VerSprite Security Resources, Videos
Security Considerations for Remote IT Staff
In The News, VerSprite Security Resources, Videos
ATL Channel 2 News Interviews VerSprite CEO on Security Gaps Found in DeKalb Data Center
In The News, VerSprite Security Resources, Videos
Georgia Tech Data Breach: VerSprite Interviewed on Threat Motives
VerSprite Security Resources, Videos
Secure Development of Payment Applications
VerSprite Security Resources, Videos
Deep Dive into the Dalvik Virtual Machine’s JIT Implementation
VerSprite Security Resources, Videos
[Video] Abusing Insecure WCF Endpoints
VerSprite Security Resources, Videos
Fixing Threat Models with OWASP Efforts
Threat Modeling, VerSprite Security Resources, Videos
AppSec EU 2017: Modeling Threats for Applications
Threat Modeling, VerSprite Security Resources, Videos
CRESTCON 2019: Threat Modeling for Defense and Offense
VerSprite Security Resources, Videos, Webinars
Cyber Liability Insurance and Your Security Program – How They Fit
VerSprite Security Resources, Videos
Waypoint | Threat Modeling Tool Overview
Cloud Security, VerSprite Security Resources, Videos
WD My Cloud Command Injection – Access All Private Folders
Cloud Security, VerSprite Security Resources, Videos
WD My Cloud Command Injection – Remote Root with WebRTC
Subscribe for Our
Updates
Please enter your email address and recive the latest updates