Optiv Blog

The Aftermath of Meltdown and Spectre: Now What?

· By Michael Lines · 0 Comments

The recent unveiling of the widely reported Meltdown and Spectre attacks, which exploit critical vulnerabilities in modern processors, sent many within and outside the security industry into a tizzy. In the days following their public announcement, companies are struggling to understand the scope of the issue, their vulnerability and what they can do about it.

Continue reading 0 Shares

The Fundamentals of Identity and Access Management

· By Janel Schalk · 0 Comments

Identity and access management (IAM) is an exciting world filled with dreams of business enablement while reducing risks and implementing security policies and processes. However, it can be daunting to educate, prioritize, pick and implement solutions, and then maintain all of it with thoughtful governance.

Continue reading 0 Shares

Regarding Spectre and Meltdown

· By Michael Belton · 0 Comments

On January 3, 2018, the Graz University of Technology released their papers on identified vulnerabilities dubbed “Meltdown” and “Spectre” via the website https://meltdownattack.com. Within the papers, they went over these critical vulnerabilities that could be exploited in modern processors from hardware bugs that would allow programs to steal data that is currently being processed on the computer. These exploits affect desktop, laptop, cloud computing and smartphone platforms.

Continue reading 0 Shares

Securing the Cloud is About Teamwork

· By John Turner · 0 Comments

I spoke about cloud at a conference a few weeks ago, but I still have lots of thoughts on the topic bouncing around in my head. If you haven’t yet, head on over to our YouTube page and check out the two videos I made on my talk and let me know what you think. For this blog, I’ll be going over some aspects of my presentation in more detail, take a look forward to cloud as we approach 2018, and anything else cloud related on my mind.

Continue reading 0 Shares

Security vs. End User Experience – Find the Balance

· By Dusty Anderson · 0 Comments

Have we become so focused on serving our customers that we are willing to cut corners for the sake of speed and convenience, only to subject the organization to security risks? I’m not suggesting that one has to be prioritized over the other, you can provide a great user experience, while also keeping your users’ identities and access secure. It is possible to achieve a healthy balance.

Continue reading 0 Shares

Cyber Threat Intelligence Requires Commitment

· By Ken Dunham · 0 Comments

It’s been said that in a breakfast of bacon and eggs, the chicken is involved but the pig is committed. This saying is relevant when implementing a cyber threat intelligence program. You must be committed in order to succeed. In this blog post, I’ll explore some of the common pitfalls of implementing a cyber threat intelligence program.

Continue reading 0 Shares

PCI Requirement Changes Coming in 2018

· By Jeff Hall · 0 Comments

The end of 2017 is quickly approaching, and we thought we should remind you of the PCI requirement changes that are coming next year. Some of these deadlines will go into effect at the end of January, so if you are not on top of these you had better get moving. As of February 1, 2018, the following will become requirements for all organizations complying with the PCI DSS.

Continue reading 0 Shares

Want to be a Great Security Leader? You Need a Great Lawyer

· By J.R. Cunningham · 0 Comments

Information security continues to evolve as a profession, and this is certainly evident in the role that legislation, privacy, third-party risk and incident management play in the daily life of the information security leader. More often, as I meet with clients to discuss security strategy and risk, security leaders are struggling with the myriad of compliance requirements, various state and national privacy laws, and their relationship with the information security program.

Continue reading 0 Shares

The Risk of Cryptocurrencies

· By Courtney Falk · 0 Comments

Cryptocurrencies are a libertarian ideal: a monetary system outside the control of big government. The modern digital world provides the necessary components for a cryptocurrency to succeed. Computing power has advanced sufficiently to lower the processing burden of cryptography. Now systems are both powerful enough and affordable enough that there is a sufficiently large audience for a cryptocurrency system. But where cryptocurrencies solve some of the fundamental problems of centralized currencies, they also introduce some new problems while still falling victim to other, age-old problems.

Continue reading 0 Shares

Five Steps to Ensuring a Successful Identity and Access Management Solution Deployment

· By Tony Naples · 0 Comments

After endless cost-benefit meetings, business case rewrites and months of organizational readiness activities, your identity and access management (IAM) project is funded, has a staff and a start date. You did everything possible from an organizational readiness perspective to prepare and ensure conditions were set to achieve maximum value. Now you are ready to deploy the solution, and following these five steps can help your organization have a successful project launch.

Continue reading 0 Shares
(626 Results)