A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
OPTIV/SOURCE ZERO Latest news and research on red and blue team security capabilities, objective tool analysis and step-by-step solutions. The Source Zero® platform provides a space for the Optiv community to share their knowledge, research and tools. See our newest insights on subjects ranging from ethical hacking to threat intelligence to application security. Image Search Terms Type - Any -BlogToolVideo Team - Any -RedBluePurple/No Team Sort By LatestOldest Image The Evolution of Cloud Forensics and Incident Response May 26, 2021 With the adoption of cloud infrastructure rapidly changing our attack landscape, we find ourselves with SOC and IR teams asking for some of the same... See Details Video Image Rethink Remediation - Linear vs. Lifecycle May 26, 2021 Every organization takes part in some kind or remediation within their organization. Within Optiv's Threat, Vulnerability and Remediation practice, we... See Details Video Image Leveling Up Your Phishing Game On Modern Platforms May 26, 2021 Modern platforms are consistently developing new phishing detections to stop attackers and popular techniques are not going to cut it anymore. Aaron... See Details Video Image GraphQL Vulnerabilities May 26, 2021 GraphQL, an open-source data query language for APIs, has been becoming more prevalent in modern applications. A brief overview of the technology as... See Details Video Image Practical Password Guessing Workshop May 26, 2021 Whether you are a pro, or just getting starting, red team or blue team. Or maybe just want to learn how attackers can compromise various network... See Details Video Image OSINT: Discovery and Profiling for Pentesters May 26, 2021 OSINT can encompass the investigation of an individual, groups of people and/or organizations, all which require the application of different toolsets... See Details Video Image Deep Dive Into Android Static Analysis and Exploitation May 26, 2021 The talk will highlight some of the common mistakes made by developers while coding mobile applications and how attackers can exploit them. We will... See Details Video Image Get Off My wLan - Hacking Wireless Networks May 26, 2021 As enterprises modernize their wireless technology, new attacks have developed on the horizon. The presentation will cover WiFi terminology, various... See Details Video Image Legacy Attack Surface in the Modern Enterprise May 26, 2021 With a heavy focus on monitoring, host based detection and attack prevention, much of a legacy attack surface still remains. MitM attacks utilizing... See Details Video Image Open Source Forensic Threat Hunting May 25, 2021 In this session I will demonstrate the use of open source software Judge Jury and Executable to acquire forensic data into a database where we will... See Details Video Image Accelerating Vulnerability Remediation with Automation May 25, 2021 Using Microsoft Automation to bridge technology gaps and fully automate vulnerability discovery to remediation with the assistance of RPA. See Details Video Image Creating a Shared Reality - Ad-hoc Intelligence Collection for Emerging Threats May 25, 2021 This talk is built from the background of how the EIM practice rapidly collected and consolidated threat intelligence from myriad sources following... See Details Video Pagination First page « First Previous page ‹ Previous … Page 4 Page 5 Page 6 Page 7 Current page 8 Page 9 Page 10 Page 11 Page 12 Next page Next › Last page Last » Introducing Source Zero Our new technical cybersecurity thought leadership resource, Source Zero, focuses on red and blue team security capabilities, objective tools analysis, and more.
Image The Evolution of Cloud Forensics and Incident Response May 26, 2021 With the adoption of cloud infrastructure rapidly changing our attack landscape, we find ourselves with SOC and IR teams asking for some of the same... See Details Video
Image Rethink Remediation - Linear vs. Lifecycle May 26, 2021 Every organization takes part in some kind or remediation within their organization. Within Optiv's Threat, Vulnerability and Remediation practice, we... See Details Video
Image Leveling Up Your Phishing Game On Modern Platforms May 26, 2021 Modern platforms are consistently developing new phishing detections to stop attackers and popular techniques are not going to cut it anymore. Aaron... See Details Video
Image GraphQL Vulnerabilities May 26, 2021 GraphQL, an open-source data query language for APIs, has been becoming more prevalent in modern applications. A brief overview of the technology as... See Details Video
Image Practical Password Guessing Workshop May 26, 2021 Whether you are a pro, or just getting starting, red team or blue team. Or maybe just want to learn how attackers can compromise various network... See Details Video
Image OSINT: Discovery and Profiling for Pentesters May 26, 2021 OSINT can encompass the investigation of an individual, groups of people and/or organizations, all which require the application of different toolsets... See Details Video
Image Deep Dive Into Android Static Analysis and Exploitation May 26, 2021 The talk will highlight some of the common mistakes made by developers while coding mobile applications and how attackers can exploit them. We will... See Details Video
Image Get Off My wLan - Hacking Wireless Networks May 26, 2021 As enterprises modernize their wireless technology, new attacks have developed on the horizon. The presentation will cover WiFi terminology, various... See Details Video
Image Legacy Attack Surface in the Modern Enterprise May 26, 2021 With a heavy focus on monitoring, host based detection and attack prevention, much of a legacy attack surface still remains. MitM attacks utilizing... See Details Video
Image Open Source Forensic Threat Hunting May 25, 2021 In this session I will demonstrate the use of open source software Judge Jury and Executable to acquire forensic data into a database where we will... See Details Video
Image Accelerating Vulnerability Remediation with Automation May 25, 2021 Using Microsoft Automation to bridge technology gaps and fully automate vulnerability discovery to remediation with the assistance of RPA. See Details Video
Image Creating a Shared Reality - Ad-hoc Intelligence Collection for Emerging Threats May 25, 2021 This talk is built from the background of how the EIM practice rapidly collected and consolidated threat intelligence from myriad sources following... See Details Video