
April 25, 2018
General thought: A breach of trust is different than a breach of security. Trust and security, while related, are very different from each other. In....
Blog
April 25, 2018
General thought: A breach of trust is different than a breach of security. Trust and security, while related, are very different from each other. In....
Blog
September 24, 2017
There’s evidence that ransomware may be evolving beyond holding data hostage. In recent news, DDoS attacks were used as a threat against organizations....
Blog
July 27, 2017
Every year I like to take a look at the talks at Black Hat and DEFCON to see if there are areas of risk I need to review. This year, like others, has....
Blog
May 23, 2017
Over the years, security organizations have had to deal with many vulnerabilities that required quick response and remediation. Some examples that....
Blog
May 16, 2017
In the first part of the blog series, we alluded to the impending danger of ransomware campaigns. It appears the concerns were justified, given the....
Blog
April 05, 2017
In the world of third-party and vendor risk management, many new practices are being adopted. Over the past few weeks, members of Optiv’s third-party....
Blog
April 20, 2016
With the rising threat of ransomware, we continue to see more and more coverage of the topic in the news and in marketing campaigns. I guess about....
Blog
February 10, 2016
Many of us are consumers of technology, I would consider myself in the upper echelon of this group. I own multiple laptops, desktops, servers, cloud....
Blog
October 21, 2014
An effective strategy to help protect your organization is to reduce the noise, allowing for easier detection of an exploit; while at the same time....
Blog
July 28, 2014
When asked, “Do you have an insider threat problem?” many organizations might conclude that they have no issues and nothing to worry about, others....
Blog