Skip to main content
Sort By:

PCI DSS and the Network Diagram

This post is designed to give a high level overview of what should be included in a network diagram and how to incorporate simple data flow indicators...

See Details

The Times They Are A-Changin'

We at Accuvant LABS have been overwhelmed by the positive feedback we’ve received for our research paper “Browser Security Comparison – A Quantitative...

See Details

Inherent and Residual Risk: How Both Scores Drive Enterprise Risk Decisions

A commonly accepted definition of risk is: “The likelihood that a threat (or a threat agent) will exploit a given vulnerability, multiplied by the bus...

See Details

Measure Twice, Cut Once

Shortly, Accuvant LABS will be releasing some research findings on web browser security.  Instead of relying solely on statistical data regarding vuln...

See Details

Mozilla Firefox, Google Chrome or Microsoft Internet Explorer - Which Web Browser is Most Secured?

Accuvant LABS has just released some new research that compares the security of three of the most widely used web browsers – Mozilla Firefox, Google C...

See Details

Crack the Case Before You Open It

Conventional forensics has long since had a consistent approach to investigations: grab the data from the infected machines, load it into an analysis ...

See Details

Security Assessment Pitfalls | Optiv

FishNet Securitys Assessment Team has delivered on thousands of projects involving Vulnerability Assessments, Penetration Tests, Wireless Security Ass...

See Details

Path of Least Resistance

I do a good number of internal penetration tests, and I have found one particular series of techniques that tend to be very quick and efficient at ga...

See Details

Securing Network Architecture - Part 2 | Optiv

The methodology of securing any network architecture should include, but not be limited to, the network topology, security assets, device features and...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.