
March 21, 2018
At approximately 9:30am EDT on 20 March 2018, hacktivist collective, MinionGhost, announced planned cyber attacks against unspecified Asian entities....
Blog

March 14, 2018
Pass-the-hash (PtH) is an all too common form of credentials attack, especially since the advent of a tool called Mimikatz. Using PtH to extract from....
Blog

March 13, 2018
Smoke testing in the traditional definition is most often used to assess the functionality of key software features to determine if they work or....
Blog

March 07, 2018
In part 1 of this series, we provided insights responding to the frequent question regarding control frameworks and their place in the security....
Blog

March 06, 2018
In this latest post of my Payment Card Industry Data Security Standard (PCI DSS) compliance blog series, we will explore Requirement 4 of the standard....
Blog

February 27, 2018
During hundreds of strategy, risk and compliance engagements, Optiv’s consultants often have been asked very thoughtful and deep questions about....
Blog

February 25, 2018
May 25, 2018 is a day that many organizations have (or should have) marked on their calendars as a game-changing moment for their business. That’s the....
Blog

February 14, 2018
It's no secret that data breaches are an ugly reality for businesses today, and despite ever increasing investments, organizations seem unable to stem....
Blog

February 13, 2018
The 2018 Winter Olympics opening ceremony was last Friday, opening the world stage to elite athletes competing in the latest chapter of these historic....
Blog

February 12, 2018
While micro-segmentation, software-defined networking (SDN) and software-defined data center (SDDC) technology providers VMWare, Cisco and Amazon Web....
Blog

February 07, 2018
In my last blog post, I discussed the process of creating a binary that contained a reverse PowerShell payload, only it did not leverage PowerShell....
Blog

February 06, 2018
Optiv has seen a continuation of attacks based off the usage of CryptoNight miner, in this case likely mining Monero cryptocurrency for the attackers....
Blog