Skip to main content
Sort By:

Testing Web App CAPTCHA controls

CAPTCHA ("Completely Automated Public Turing test to tell Computers and Humans Apart") is a type of challenge-response test used by many web applicati...

See Details

Creating a Solid Information Security Program

A successful security program is not run like a dictatorship but rather like a partnership, one of the team, all fighting for a common cause. In order...

See Details

Most Common Internal Vulnerabilities Found

You can patch OSes all you want and scan your network with just about any general vulnerability scanner but you've left out one very important step - ...

See Details

SCTP Linux Kernel Vulnerability Assessment and Reproduction

Overview: The blog post here makes statements about a vulnerability in the Linux kernel handling of SCTP data. The primary point of the post is to sh...

See Details

The difference between high speed and low drag application assessments.

The difference between a mediocre application assessment and a stellar one is assimilation of information and the ability to apply it to the problem a...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cyber security Events in your area.