
March 02, 2017
In the final installment, we will again be looking at an instance of vulnerability stacking, this time, however, we’ll be focused on account....
Blog

February 27, 2017
Back in the day, cloud was the big buzzword. Are you in the cloud? Have your started to use the cloud? Every company, big or small, was offering some....
Blog

February 26, 2017
In the scenario, we focus on session management. The most common session management mechanism is a session cookie. We commonly see session cookies....
Blog

February 22, 2017
There is a growing trend in the information security and risk management world of ignoring low severity findings from security testing. Perhaps it....
Blog

February 16, 2017
“Actionability” is something we are starting to hear more and more from industry sales and marketing, but often doesn’t translate into reality for....
Blog

February 13, 2017
Traditionally, wireless networks were considered a luxury, as well as highly unreliable and unsecure. Over the past 10 years, wireless networks have....
Blog

January 29, 2017
Security OF the cloud versus security IN the cloud. This by no means is intended to be a riddle. In fact, the irony is that cloud computing has solved....
Blog

January 25, 2017
A command kill chain consists of payload delivery, code execution on a target system, and establishing a command and control (C2) channel outside of a....
Blog

January 19, 2017
TTPs are the “patterns of activities or methods associated with a specific threat actor or group of threat actors.”
Blog

January 16, 2017
The adversaries trying to breach your cyber defenses have a plan, do you? A few weeks ago, the National Institute of Standards and Technology (NIST)....
Blog

January 11, 2017
Cyber threat intelligence should always enable decision making and action, but what good is a cyber threat intelligence program if you take no action....
Blog

December 20, 2016
Cyber threat intelligence is a process required to make action-oriented, judgement-based decisions that are not otherwise possible. Optiv recommends....
Blog