Skip to main content
Sort By:

Top 10 Network Security Mistakes - #6: Logging & Monitoring | Optiv

Continuing along our journey through the Top 10 Network Security Mistakes, today we’ll take a look at logging and monitoring. Hopefully we can all agr...

See Details

Using Burp Suite to Test Web Services with WS-Security

During a recent engagement we ran into a web service endpoint that was using WS-Security for authentication, specifically it was using the “Username T...

See Details

Are You On Cloud Nine Yet?

CIOs and CTOs looking to reduce costs, drive innovation and maintain a strategic advantage over their competitors can’t afford to overlook the cloud. ...

See Details

WiFi Management Tools Help Ensure WLAN Health

For many organizations, the wireless local area network (WLAN) has changed from an optional item to a mission-critical service. Customers and employee...

See Details

CryptoLocker Prevention and Remediation Techniques

If you’re running Windows XP through Windows 8, chances are you've heard of CryptoLocker by now. If not, for some background, check out our previous 6...

See Details

Indoor Location Services (ILS) - Bring a competitive advantage to your enterprise network

In the last few months, we've heard a great deal about how indoor location services are becoming the “next” frontier in differentiating your environme...

See Details

What You Should Take Away From The PCI DSS 3.0 – Part 1

There are a lot of people and organizations pointing to “business as usual” or BAU as the huge take away from the latest version of the PCI DSS. Yet a...

See Details

How-To: Post-Ex Persistence Scripting with PowerSploit & Veil

Many penetration testers within the security industry state that getting a system shell is just the starting point for an attack. Sure, I agree, and q...

See Details

Business Continuity Planning (BCP) is a Necessity

Business continuity and contingency planning are vital activities for every company regardless of size. Every day, businesses are confronted with disa...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cyber security Events in your area.