September 20, 2023
Optiv's Global Threat Intelligence Center (gTIC) breaks down the latest critical vulnerabilities that your security teams should be aware of.
Blog

September 20, 2023
As the incidents of cybersecurity incidents rise, leadership at the executive and board levels need to look at cybersecurity as a business-critical....
Blog

September 13, 2023
The SEC’s approved cybersecurity disclosure rules for publicly traded companies means organizations need to act fast to be in compliance. Here’s what....
Blog

September 08, 2023
By making graphics cards faster each year, red teamers can crack passwords faster. Learn more about the significance of CUDA cores.
Blog

September 08, 2023
Improving security in the SDLC's implementation phase is crucial. Read best practices for secure build, secure deployment and defect management.
Blog

September 06, 2023
Learn how to enhance your data security posture by deciphering customer needs, improving optimization and accuracy and addressing risk assessment.
Blog

August 25, 2023
Adversaries can utilize native tools to remain undetected by defenders. See our demo of how red and blue teamers can enhance engagements with LOLBins.
Blog

August 25, 2023
Optiv's Global Threat Intelligence Center (gTIC) provides new cyber intel pertaining to the Russia/Ukraine conflict.
Blog

August 16, 2023
How is the cyber insurance industry growing to meet industry demands? Learn how threat intelligence plays a role.
Blog

August 04, 2023
An API inventory can identify duplicate API functionality. Read how organizations can reduce redundant development costs as they create, track and....
Blog

August 03, 2023
Optiv breaks down the critical software and services vulnerabilities of July 2023, including RCE and REST API access flaws.
Blog

August 02, 2023
In this State of Ransomware blog post, gTIC covers a 2023 Midyear ransomware activities and trends, mitigations, and what we expect looking forward.
Blog