Skip to main content
Sort By:

Bypassing CSRF Tokens via XSS

Many web development platforms provide libraries that handle the creation and validation of tokens with each HTTP request to prevent Cross Site Reques...

See Details

Beyond the Security Team Brief

Significant cyber security incidents require a full complement of activities and resources to verify, investigate and remediate.

See Details

Don’t Chase the Latest “Shiny Object” Technology

When enterprises face security challenges, we too often see them respond by purchasing more point technologies. The lure of the latest “buy it, deploy...

See Details

Breaking Credit Card Tokenization – Part 1

This is the first in a series of blog posts on the topic of breaking credit card tokenization systems and is the written version of several conference...

See Details

Security Awareness Training Brief

Learn how to leverage the latest thinking in cognitive science to improve training.

See Details

Cyber Security Insurance Brief

Learn how to assess the role of cyber security insurance in overall breach preparedness planning.

See Details

A Place at the Table - Part 2

In the first part of this blog series, I explored the shortage of women in IT security and talked about the fact that women have been a part of techno...

See Details

A Place at the Table - Part 1

Last year, I put together a presentation centered on women in IT security called, "A Place at the Table." The talk explored the reasons why women may ...

See Details

Making Your Endpoints Intelligent

As you have probably heard ad nauseam by now, security in the modern computing world is no longer about putting up a wall and preventing threats from ...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cyber security Events in your area.