Home | VerSprite Resources
View VerSprite's Compliance Advisory Services →
Download Service Listings
Security Controls
In this blog post we will take a deeper dive into exactly how to approach integrating security into your Software Development LifeCycle (SDLC). In addition, we will delve into one available resource that provides guidance on how to get started.
Learn more
VerSprite
SonarQube Tutorial
In this tutorial, VerSprite’s DevOps team walks you through how to automate SAST into your CI/CD pipeline
Mark Rood and Lara Ares
Continuous Integration & Continuous Delivery (CI/CD)
This guide builds on the introduction of “Security as Code”. As expected, this is the automation of security checks and gates via code and integrated into the overall DevOps process again following software engineering practices.
Greg Mosher
Web Application Security
The rise of regulations and demand for more agile engineering practices is forcing CISOs and security programs to develop more sophisticated ways to adhere to security requirements from regulations, internal governance, and clients.
Tony UcedaVélez
Use of public cloud infrastructure is now commonplace with nearly $60 billion spent annually. Of course, there are good reasons for this as Infrastructure and Platform as a Service provide several advantages over traditional in-house hosting. VerSprite shares key principles that will help you manage your cloud security risk.
DevSecOps efforts are changing how we govern security controls via greater automation tools that are readily available to leverage. Watch this webinar to discover how to “shift left” in terms of implementing critical security controls during the pre-implementation phases of the Software Development Life Cycle (SDLC).
Google Cloud Platform
Cloud Security Scanner checks for security vulnerabilities in your App Engine and Compute Engine web applications. It is designed to complement your existing secure design and development processes.
Esteban Mendoza
Threat Intelligence
Given the noticeable upward trend in Azure adoption, let’s explore more about Azure security, compliance, and its other rich capabilities. In this post we’ll just touch on big picture and what is important to securing your Azure environment.
Back to Resources
We are an international squad of professionals working as one.
Email
Phone