Every Solution You Can Imagine – and More What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Image Up-to-date information and research on red and blue team security capabilities, objective tools analysis, new research and step-by-step solutions. The Source Zero® platform is a community of Optiv’s skilled individuals doing research and sharing their expertise. The Source Zero Tools are resources that provide actionable support and demonstrations around research initiatives. Image 2022 Source Zero Con Videos View the 2022 Source Zero Con Content On-Demand. Visit Source Zero 2022 Search Terms Type - Any -BlogToolVideo Team - Any -RedBluePurple/No Team Sort By LatestOldest Image Like Tears in Rain: A DeathHiddenTear Ransomware Breakdown July 02, 2020 Here is current analysis insight and a YARA rule to help you detect HiddenTear ransomware variants. See Details Blog Image Aligning Defender ATP Alerts to MITRE ATT&CK - Video Demonstration June 30, 2020 How to prioritize efforts based on alert information from Microsoft Defender ATP, Logic Apps, and Log Analytics. See Details Blog Image Brute Force Account Testing Using Burp Intruder June 19, 2020 Burp Suite’s Intruder tool can be used to automate testing for weak/default passwords. See Details Blog Image Digging Your Talons In – New Take On Password Guessing June 19, 2020 Talon automates a password guessing technique targeting Kerberos and LDAP within the Windows Active Directory environment. See Details Blog Image Infrastructure as Code: Terraform, AWS EKS, Gitlab & Prisma Cloud June 11, 2020 A how to guide using Gitlab, Hashicorp Terraform Cloud, AWS EKS and Palo Alto Networks Prisma Cloud to build and secure a Kubernetes cluster. See Details Blog Image Visual Lock Picking Workstation June 11, 2020 The Visual Lock Picking Workstation displays the inner workings of a lock while teaching lock picking. See Details Blog Image Azure API Management Tracing Helper June 11, 2020 This paper explores the Burp Suite extension for Azure API Management to automatically identify gateway misconfigurations and to display the tracing.... See Details Blog Image Microsoft Defender ATP Telemetry: Workbook Visualizations (Part 3) June 11, 2020 Part 3 of series: Prioritizing Microsoft Defender ATP endpoint alert telemetry with MITRE ATT&CK. See Details Blog Image Microsoft Defender ATP Telemetry: Azure Log Analytics Workspace (Part 2) June 11, 2020 This post demonstrates how to pull DATP data into Azure Log Analytics workspaces using a Logic App. See Details Blog Image Microsoft Defender ATP Telemetry: Viewing MITRE ATT&CK Context (Part 1) June 11, 2020 This post helps prioritize efforts based on alert information you're already receiving from Microsoft #Defender #ATP. See Details Blog Pagination First page « First Previous page ‹ Previous Page 1 Page 2 Page 3 Page 4 Page 5 Current page 6 Introducing Source Zero Our new technical cybersecurity thought leadership resource, Source Zero, focuses on red and blue team security capabilities, objective tools analysis, and more.
Image Like Tears in Rain: A DeathHiddenTear Ransomware Breakdown July 02, 2020 Here is current analysis insight and a YARA rule to help you detect HiddenTear ransomware variants. See Details Blog
Image Aligning Defender ATP Alerts to MITRE ATT&CK - Video Demonstration June 30, 2020 How to prioritize efforts based on alert information from Microsoft Defender ATP, Logic Apps, and Log Analytics. See Details Blog
Image Brute Force Account Testing Using Burp Intruder June 19, 2020 Burp Suite’s Intruder tool can be used to automate testing for weak/default passwords. See Details Blog
Image Digging Your Talons In – New Take On Password Guessing June 19, 2020 Talon automates a password guessing technique targeting Kerberos and LDAP within the Windows Active Directory environment. See Details Blog
Image Infrastructure as Code: Terraform, AWS EKS, Gitlab & Prisma Cloud June 11, 2020 A how to guide using Gitlab, Hashicorp Terraform Cloud, AWS EKS and Palo Alto Networks Prisma Cloud to build and secure a Kubernetes cluster. See Details Blog
Image Visual Lock Picking Workstation June 11, 2020 The Visual Lock Picking Workstation displays the inner workings of a lock while teaching lock picking. See Details Blog
Image Azure API Management Tracing Helper June 11, 2020 This paper explores the Burp Suite extension for Azure API Management to automatically identify gateway misconfigurations and to display the tracing.... See Details Blog
Image Microsoft Defender ATP Telemetry: Workbook Visualizations (Part 3) June 11, 2020 Part 3 of series: Prioritizing Microsoft Defender ATP endpoint alert telemetry with MITRE ATT&CK. See Details Blog
Image Microsoft Defender ATP Telemetry: Azure Log Analytics Workspace (Part 2) June 11, 2020 This post demonstrates how to pull DATP data into Azure Log Analytics workspaces using a Logic App. See Details Blog
Image Microsoft Defender ATP Telemetry: Viewing MITRE ATT&CK Context (Part 1) June 11, 2020 This post helps prioritize efforts based on alert information you're already receiving from Microsoft #Defender #ATP. See Details Blog