Every Solution You Can Imagine – and More What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Image Up-to-date information and research on red and blue team security capabilities, objective tools analysis, new research and step-by-step solutions. The Source Zero® platform is a community of Optiv’s skilled individuals doing research and sharing their expertise. The Source Zero Tools are resources that provide actionable support and demonstrations around research initiatives. Image 2022 Source Zero Con Videos View the 2022 Source Zero Con Content On-Demand. Visit Source Zero 2022 Search Terms Type - Any -BlogToolVideo Team - Any -RedBluePurple/No Team Sort By LatestOldest Image Assigning Specific Public IP Addresses With Azure Automation Runbook November 04, 2020 How to assign a specific public IP address using Azure Automation runbook. Part three in a series. See Details Blog Image Uploading WinAutomation Screenshots to Azure Container Storage Using Invoke-AzVMRunCommand November 04, 2020 How to upload WinAutomation screenshots to Azure Container Storage using Invoke-AzVMRunCommand – part six in a series. See Details Blog Image Provisioning RPA Test Environments With Azure Automation Runbooks November 04, 2020 How to provision a test environment for robotic process automation with Azure automation runbooks: part two in a series. See Details Blog Image Using Microsoft Flows and UI Flows for Patch and Software Testing November 04, 2020 Can user workflow verification be tested in an automated fashion using Microsoft Power Automate Flows, UI Flows and Automation Runbooks? See Details Blog Image There's Gold in Them Thar Metadata!! September 30, 2020 Hackers can use the username structure and deployed technologies in an online document’s metadata to successfully breach the perimeter. See Details Blog Image Defending Against Container Threats With Palo Alto Prisma Cloud September 16, 2020 Palo Alto Networks Prisma Compute can help minimize the risk of deploying untrusted images. See Details Blog Image Attacking the JNI Boundary with Frida September 11, 2020 Moving functionality from Java to native implementations in Android increases obscurity but not security. See Details Blog Image DEF CON 2020 Red Team Village Talk - Breaking The Attack Chain September 02, 2020 Two experienced red teamers describe successful engagements and how to counter attack chains. See Details Blog Image Walkthrough of an iOS CTF August 25, 2020 A quick walkthrough of the general steps taken to solve an iOS CTF. See Details Blog Image Netwrix Account Lockout Examiner 4.1 Disclosure Vulnerability August 13, 2020 Netwrix Account Lockout Examiner (versions prior to 5.1) allows an unauthenticated remote adversary to capture the NTLMv1/v2 challenge response.... See Details Blog Image Anatomy of a Kubernetes Attack - How Untrusted Docker Images Fail Us July 22, 2020 An attacker could use a poisoned docker image to break out of a container. See Details Blog Image Optiv’s REST API “Goat” July 10, 2020 Optiv is releasing REST API Goat, a vulnerable API, to help boost AppSec skills. See Details Blog Pagination First page « First Previous page ‹ Previous Page 1 Page 2 Page 3 Page 4 Current page 5 Page 6 Next page Next › Last page Last » Introducing Source Zero Our new technical cybersecurity thought leadership resource, Source Zero, focuses on red and blue team security capabilities, objective tools analysis, and more.
Image Assigning Specific Public IP Addresses With Azure Automation Runbook November 04, 2020 How to assign a specific public IP address using Azure Automation runbook. Part three in a series. See Details Blog
Image Uploading WinAutomation Screenshots to Azure Container Storage Using Invoke-AzVMRunCommand November 04, 2020 How to upload WinAutomation screenshots to Azure Container Storage using Invoke-AzVMRunCommand – part six in a series. See Details Blog
Image Provisioning RPA Test Environments With Azure Automation Runbooks November 04, 2020 How to provision a test environment for robotic process automation with Azure automation runbooks: part two in a series. See Details Blog
Image Using Microsoft Flows and UI Flows for Patch and Software Testing November 04, 2020 Can user workflow verification be tested in an automated fashion using Microsoft Power Automate Flows, UI Flows and Automation Runbooks? See Details Blog
Image There's Gold in Them Thar Metadata!! September 30, 2020 Hackers can use the username structure and deployed technologies in an online document’s metadata to successfully breach the perimeter. See Details Blog
Image Defending Against Container Threats With Palo Alto Prisma Cloud September 16, 2020 Palo Alto Networks Prisma Compute can help minimize the risk of deploying untrusted images. See Details Blog
Image Attacking the JNI Boundary with Frida September 11, 2020 Moving functionality from Java to native implementations in Android increases obscurity but not security. See Details Blog
Image DEF CON 2020 Red Team Village Talk - Breaking The Attack Chain September 02, 2020 Two experienced red teamers describe successful engagements and how to counter attack chains. See Details Blog
Image Walkthrough of an iOS CTF August 25, 2020 A quick walkthrough of the general steps taken to solve an iOS CTF. See Details Blog
Image Netwrix Account Lockout Examiner 4.1 Disclosure Vulnerability August 13, 2020 Netwrix Account Lockout Examiner (versions prior to 5.1) allows an unauthenticated remote adversary to capture the NTLMv1/v2 challenge response.... See Details Blog
Image Anatomy of a Kubernetes Attack - How Untrusted Docker Images Fail Us July 22, 2020 An attacker could use a poisoned docker image to break out of a container. See Details Blog
Image Optiv’s REST API “Goat” July 10, 2020 Optiv is releasing REST API Goat, a vulnerable API, to help boost AppSec skills. See Details Blog