Skip to main content

January 06, 2020

Image Risks

Part Three of our series explores what native AWS tools and third-party solutions are available to address the risks identified in the NIST SP 800-190...

See Details

January 02, 2020

Extending the Hybrid Cloud Lab

Part 2 in the Gaining Visibility into NIST SP 800-190 series is designed for security practitioners and others starting down the path of understanding...

See Details

October 11, 2019

CloudFormation Templates: What’s in That Stack?

In this blog we show an example of a basic formation template attack. It’s opportunistic and it would be very hard to target a specific organization i...

See Details

February 08, 2018

Unmanaged PowerShell Binaries and Endpoint Protection – Part 2

In my last blog post, I discussed the process of creating a binary that contained a reverse PowerShell payload, only it did not leverage PowerShell.ex...

See Details

November 10, 2017

Unmanaged PowerShell Binaries and Endpoint Protection

Optiv recently completed our 2017 endpoint security solution evaluation. The primary focus of the evaluation was to test the solutions’ efficacy acros...

See Details