Skip to main content
Sort By:

Rough Thoughts on Mobile/Digital Voting

In this guest post, Imperva’s Kunal Anand the challenges facing digital voting.

See Details

Azure Native and Third-Party Tools: New White Paper

This paper helps you understand cloud infrastructure assessment tools provided with Microsoft Azure and other third parties.

See Details

Security and COVID: Moving Past Duct Tape and Baling Twine

As COVID operations settle down it’s time to reestablish a strategic cybersecurity mindset.

See Details

Executive Order: White House takes on Utility Hackers…

Managing an OT security program that meets C-Suite budgets and White House expectations is difficult but possible.

See Details

Energy Sector Critical Infrastructure: The Enemy Perspective

This article discusses how threat actors attack critical energy infrastructure and how they achieve success.

See Details

Coronavirus: Back-to-Basics Threats, Back-to-Basics Security

The need to secure remote workers is a permanent part of the landscape.

See Details

ATT&CK Series: Collection Tactics – Part Two

The NIST Privacy Framework formalizes what risk and privacy professionals already know should be done.

See Details

COVID-19: From the Mindset of the Attacker

We’ve seen lots of COVID-19-related work-from-home tips, but how has it affected the attacker?

See Details

Things people haven’t said about Zoom yet... Zoom Security Management Strategy

This post addresses potential Zoom security flaws that haven’t yet been addressed in the media.

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.