Skip to main content
Sort By:

CloudFormation Templates: What’s in that Stack?

In this blog we show an example of a basic formation template attack. It’s opportunistic and it would be very hard to target a specific organization i...

See Details

Service Providers and PCI Compliance, Part 3 – Remediating Missing Due Diligence

Part three of this series addressing an organization's PCI-DSS compliance obligations when they use cloud services (IAAS, PAAS, or SAAS). Part two con...

See Details

Personal Security Habits – Looking Inward

Every individual’s awareness and behavior contribute to an organization’s security. While routine awareness training may seem remedial to many of us, ...

See Details

Third-Party Risk Management – 4 Steps for a Successful Program

This post focuses on expanding partnerships, information sharing between organizations and ensuring third parties protect our data.

See Details

Service Providers and PCI Compliance, Part 2 – Third-Party Risk Management

In this post, Service Providers and PCI Compliance, Part 2 – Third-Party Risk Management, we look more closely at the relationships between organizati...

See Details

Cybersecurity: Tech to buy, tech to watch, what’s the scoop?

When it comes deciding what cybersecurity technology to invest in, compiling data can keep you from acquiring something that sits on the shelf, imposs...

See Details

The Five R's of Phishing

It’s National Cybersecurity Awareness Month – #NCSAM. So what do dodgeball and #phishing have in common? Here are the five Ds of dodgeball and the fiv...

See Details

ATT&CK Series: Impact

In this post, we will look at ATT&CK’s Impact Phase as it affects availability and integrity. There are several different techniques adversaries can u...

See Details

What are the top technologies to watch?

What technology should you look at investing in? Endpoint? Zero Trust Architecture? Security Awareness Training? SOAR? Digital transformation, which ...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.