Skip to main content

August 27, 2019

Retro Risk Appetite

Accepted risk is all too often the result of a lack of priorities around managing risk. It’s all too easy to say “We don’t want to spend $50,000 USD o...

See Details

July 30, 2019

Managing Security with MITRE ATT&CK

Optiv has been using the MITRE Adversary Tactics and Techniques and Common Knowledge (ATT&CK) framework to help clients strategically manage cybersecu...

See Details

July 18, 2019

The Evolution of Cybercrime

Fayyaz Rajpari, our Executive Services Director discusses this evolution with Ron Darnall, our senior direct of threat intelligence and Ken Dunham, ou...

See Details

May 09, 2019

Business Email Compromise (BEC) Fraud is Exploiting the Cloud

Business Email Compromise (BEC) fraud has been officially tracked by the FBI since 2013 and has been identified in more than 100 countries with losses...

See Details

February 14, 2019

Features of a Threat Intelligence Platform

A Threat Intelligence Platform (TIP) is a fantastic way to manage intelligence and its process amongst individual teams and communities, including cli...

See Details

January 24, 2019

IoC and IoA: Indicators of Intelligence

Intelligence seems to be full of three-letter acronyms, including Indicators of Compromise (IoC) and Indicators of Attack (IoA). The difference betwee...

See Details

December 18, 2018

SecOps vs. DevOps in the Information Age

Information is varied and complex, involving many data types, structures, and protocols for different types of data sets. This increases challenges fo...

See Details

December 11, 2018

Darknet Done Right

The marriage of a well-managed risk program and a targeted Darknet operation to move towards mitigation of risk is an ROI most mature companies have a...

See Details

October 31, 2018

Titanic - Lessons Learned for Cyber Security

Computer security professionals are all too familiar with the “cat and mouse” game seen on the global stage of the enemy and defenders. History does i...

See Details