
October 09, 2018
It’s important to understand the perspective of both the business and the security leader. Merchants invest heavily in PCI compliance and it’s money....
Blog

October 08, 2018
As attack surfaces expand it is critical for enterprises to develop and implement a proactive incident response (IR) plan that combats an increasing....
Blog

October 05, 2018
By far the best way to prevent a security incident is to prevent the initial access from being obtained in the first place. This is why organizations....
Blog

October 04, 2018
Businesses have spent an enormous amount of money on PCI compliance. It is time to leverage these existing investments and expand them to include....
Blog

October 03, 2018
In part three of our series focused on the Enemy Perspective, we’ll focus on an important element of incident response: digital forensics....
Blog

October 01, 2018
It’s October and that means National Cybersecurity Awareness Month (NCSAM) is upon us. This annual initiative raises awareness about the importance of....
Blog

September 28, 2018
This series is focused on the risk associated with attacks which leverage vulnerabilities that could have been mitigated through the implementation of....
Blog

September 26, 2018
In today’s digital world, data is currency. Nowhere does this phenomenon show itself more clearly than in the world of payment transactions. Payment....
Blog

September 21, 2018
The enemy gets a vote. The current Secretary of Defense and retired Marine Corps General James Mattis is fond of this observation. However, in many....
Blog

September 18, 2018
On June 4, 2018, Optiv gTIC Human Intelligence (HUMINT) cell contacted an India-based individual providing interview-proxy services for job applicants....
Blog

September 13, 2018
While part of the solution to a robust and complete security program is security automation and orchestration (SAO), do not forget that hackers are....
Blog

September 06, 2018
Postman is a useful tool used by many developers to document, test and interact with Application Programming Interfaces (APIs). This post will explore....
Blog