What Can We Help You Find?
What Can We Help You Find?

June 17, 2020
What does artificial intelligence actually mean? Evans Mehew defines it and explains its importance to cybersecurity.
Blog

June 17, 2020
Our Attack and Penetration experts validate your current environment and help reduce risk across your business.
Download

June 16, 2020
Optiv Threat Management Application Security specializes in simulating attacks on applications to identify security flaws.
Download

June 15, 2020
Secure the customer experience by acknowledging that customers want you to make them happy and keep them safe.
Blog

June 15, 2020
Our Threat Vulnerability Management Remediation provides results-based, technical vulnerability remediation to minimize the attack surface.
Download

June 11, 2020
A how to guide using Gitlab, Hashicorp Terraform Cloud, AWS EKS and Palo Alto Networks Prisma Cloud to build and secure a Kubernetes cluster.
Blog

June 11, 2020
We provide CISO-level support for organizations needing guidance on strategic plans, business alignment and more.
Download

June 11, 2020
The Visual Lock Picking Workstation displays the inner workings of a lock while teaching lock picking.
Blog

June 11, 2020
This paper explores the Burp Suite extension for Azure API Management to automatically identify gateway misconfigurations and to display the tracing....
Blog

June 11, 2020
Part 3 of series: Prioritizing Microsoft Defender ATP endpoint alert telemetry with MITRE ATT&CK.
Blog

June 11, 2020
This post demonstrates how to pull DATP data into Azure Log Analytics workspaces using a Logic App.
Blog

June 11, 2020
This post helps prioritize efforts based on alert information you're already receiving from Microsoft #Defender #ATP.
Blog