Skip to main content

February 05, 2020

#AskOptiv: Defending Against AI Weaponized Threats

How cybersecurity organizations position and defend themselves with respect to AI will separate survivors from victims.

See Details

December 19, 2019

Optiv ThreatDNA Platform and ThreatBEAT Service

The need for intelligence-driven operations resulted in Optiv’s Global Threat Intelligence Center (gTIC). In 2020, our intelligence operations will in...

See Details

November 05, 2019

Nemty Ransomware Deployed via Payment Service Phish

In late August, a new ransomware strain, Nemty, was distributed in the wild. It, coupled with a multitude of other ransomware threats in 2019, demands...

See Details

August 27, 2019

Retro Risk Appetite

Accepted risk is all too often the result of a lack of priorities around managing risk. It’s all too easy to say “We don’t want to spend $50,000 USD o...

See Details

July 30, 2019

Managing Security with MITRE ATT&CK

Optiv has been using the MITRE Adversary Tactics and Techniques and Common Knowledge (ATT&CK) framework to help clients strategically manage cybersecu...

See Details

July 18, 2019

The Evolution of Cybercrime

Fayyaz Rajpari, our Executive Services Director discusses this evolution with Ron Darnall, our senior direct of threat intelligence and Ken Dunham, ou...

See Details

May 09, 2019

Business Email Compromise (BEC) Fraud is Exploiting the Cloud

Business Email Compromise (BEC) fraud has been officially tracked by the FBI since 2013 and has been identified in more than 100 countries with losses...

See Details

February 14, 2019

Features of a Threat Intelligence Platform

A Threat Intelligence Platform (TIP) is a fantastic way to manage intelligence and its process amongst individual teams and communities, including cli...

See Details

January 24, 2019

IoC and IoA: Indicators of Intelligence

Intelligence seems to be full of three-letter acronyms, including Indicators of Compromise (IoC) and Indicators of Attack (IoA). The difference betwee...

See Details