
December 01, 2023
SASE has skyrocketed in popularity in recent years due in large part to how the solution provides strong threat protection and secure access no matter....
Blog

November 29, 2023
Optiv's® Global Threat Intelligence Center (gTIC) observed, collected, and analyzed multiple data points and information derived from Optiv's own....
Blog

November 27, 2023
Securing identity is crucial to reducing risk. Learn how to strengthen your identity governance and administration (IGA) capabilities with Optiv and....
Blog

November 20, 2023
Redirectors can enable operators to restrict and control the flow of traffic to C2 servers. Learn the use cases and implementation of redirectors.
Blog

November 17, 2023
Security operations centers are invaluable, helping to detect a complex array of attacks and enable effective and timely response efforts. SOCs need....
Blog

November 16, 2023
Adversaries can evade detection by leveraging native OS binaries called LOLBins. Learn why and how organizations should detect these techniques.
Blog

November 14, 2023
Learn how to turn your data from an enigma into an asset and elevate your data security posture with key classification strategies.
Blog

November 13, 2023
How is the care and upkeep of a SIEM similar to puppy training? Learn how to keep your SIEM healthy and reliable in this blog post.
Blog

November 03, 2023
Ransomware operators and APT groups often target organizations in the industrials vertical. Learn why in our blog.
Blog

October 30, 2023
Optiv's Global Threat Intelligence Center (gTIC) rounds up the top vulnerabilities impacting prioritized software and services.
Blog

October 20, 2023
How do law enforcement and hacktivists groups respectively approach the disruption of cybercriminal sites? Optiv highlights the key differences.
Blog

October 17, 2023
Traditional business continuity and disaster recovery plans don't address cyberattacks. Learn how to shore up your cyber resilience with a proactive....
Blog