Image
CAM2022_blogcrs-blog-list-image 2.jpg

September 28, 2022

This post covers simple yet effective strategies to help you secure the talent you have, the talent you may need as well as securing your supply chain....

Blog

Image
SZ_Hacker-Figure-At-Screen_476x210_Red.jpg

September 23, 2022

EDR hooking has become a major part of an adversary’s ability to successfully compromise an endpoint system. Hooking is a technique that alters the....

Blog

Image
Partner_Palo-Alto-Blog-AIOPS-website-list-image.jpg

September 08, 2022

Artificial Intelligence for IT Operations (AIOPS) from Palo Alto Networks is simply the smarter security choice. Gain insights while achieving a....

Blog

Image
SZ_Hacker-Falling-Code_476x210_Red

September 01, 2022

Do you think that simple tools like Gaussian blurs can safely redact sensitive content in your online images? See Optiv's solution to the....

Blog

Image
Russia-ukraine-blog-list-image.jpg

August 25, 2022

As cyber warfare from the Russia – Ukraine conflict continues, Optiv’s gTIC provides information on timely events and what to expect looking forward.

Blog

Image
guide-to-edr-list.jpg

August 19, 2022

Infrastructure as Code (IaC) is an efficient and secure way to spin up infrastructure. But It's important to scan IaC templates for errors prior to....

Blog