Skip to main content

June 05, 2019

Protect Yourself from BYOT (Bring Your Own Threat)

With the increase in mobile and remote work environments, organizations can be at risk or under threat by not securing devices, access and credentials...

See Details

April 17, 2019

MythBusters: Debunking Five Common Identity and Data Management Myths

Debunking common myths about IDM. Examples: too expensive and complex; current IT teams can't support IDM evolution; custom is better; company data/IP...

See Details

April 09, 2019

Network Trust: How to Maintain and Establish it in Your Perimeter

Everyone has heard about “the expanding attack surface” and the “ever-increasing amounts of data;” about employees wanting to access email on their ow...

See Details

December 20, 2018

Let’s Not Talk About the Past

With the year quickly coming to a close, the web is full of blogs titled, “A Look Back at 2018,” and “2018: A Post-Mortem.” We’ve decided to give you ...

See Details

November 29, 2018

It’s 2018. Password Journals are Still a Thing.

I was in a store the other day and saw something that, being in cyber security, stopped me fast: A Password Journal. Seriously. A place to write down ...

See Details

November 20, 2018

Take a Deep Breath…and Be Thankful

Ah, Thanksgiving. Time to breathe, greet the holidays and revel in a few days off, time with family, and…what’s that call on your cell? “Suspicious ac...

See Details

September 13, 2018

Skills Gap – Hiring When There’s No People

While part of the solution to a robust and complete security program is security automation and orchestration (SAO), do not forget that hackers are hu...

See Details

April 18, 2018

Testing Password Reset Token Predictability with the Reset-A-Tron Burp Extension

Most web applications provide a 'forgot my password' feature where a recovery or reset token is delivered to the associated account email address. Usu...

See Details

November 30, 2017

A Day in the Life of Optiv Cyber Security Superheroes: Peter H. Gregory

Peter H Gregory is very passionate about helping others---whether it’s helping clients develop their corporate security strategy or training the InfoS...

See Details