Home | VerSprite Resources
View VerSprite's Compliance Advisory Services →
Download Service Listings
Enterprise Data Security
Cybersecurity breaches have become more common as businesses grow their collections of data. While some breaches are remembered for the number of records lost, others may be remembered not only for their size but also for the way the breaches were managed.
Learn more
Ray Strubinger
Data Security Breach
Revelations of a massive breach of Google+, a largely defunct challenger to Facebook, suggests that the data of hundreds of thousands of users was compromised over a period from 2015 to March 2018.
Milena Rodban
Cyberwarfare
Every quarter, executives hear from their CISOs about their company’s current “state of security” or “risk posture.” CISOs present internal vulnerabilities such as weak access controls for IT to fix or exploitable code for Development to remediate.
GPR VerSprite
Back to Resources
We are an international squad of professionals working as one.
Email
Phone