Every Solution You Can Imagine – and More
What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need
Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv
Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.
However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
DEF CON 2020 Red Team Village Talk - Breaking The Attack Chain
Despite the rising tide of security maturity, targeted attack chains are often successful due to systemic weaknesses in how modern IT administrators and blue teams operate. This talk focuses on the attacker's perspective on how common attack chains can be stopped before they spiral out of control. We hear from two deeply experienced red team operators whose passion for attacking modern enterprise environments has yielded a great many instructive successes (and failures). This conversation addresses tactics and techniques from successful red team engagements as well as specific countermeasures that would hamstring these attack chains.
Read more from Matt Eidelberg:
Digging Your Talons In – New Take On Password Guessing
ATT&CK Series: Lateral Movement Techniques
It’s Not Always About the Perimeter – A Look at Domain Reconnaissance
July 22, 2020
An attacker could use a poisoned docker image to break out of a container.
July 10, 2020
Optiv is releasing REST API Goat, a vulnerable API, to help boost AppSec skills.
June 19, 2020
Burp Suite’s Intruder tool can be used to automate testing for weak/default passwords.
Let us know what you need, and we will have an Optiv professional contact you shortly.