Optiv Blog

SIEM Selection Guidance

· By Jonathan LeBeau · 0 Comments

Whether the need for a Security Information and Event Management (SIEM) is based on requirements for centralized repository and reporting or compliance-driven, clear steps and a strategy can help identify a solution best fit for an organization’s needs.

Continue reading 0 Shares

In the Kingdom of The Blind, the One-Eyed Man is King

· 0 Comments

One of the biggest threats that we see in organizations exists across policies, procedures, and products. It’s completely agnostic of configuration, manufacturers, and customization. What do you think it could be?

Continue reading 0 Shares

Bringing Your Own Identities: The New Reality

· By Robert Block · 0 Comments

I have worked in Identity Management for more than 12 years, constantly monitoring (and at times influencing) its evolution. My employer, FishNet Security, recently acquired my former company, Logic Trends. This acquisition has caused a massive inventory and maintenance of my identities.

Continue reading 0 Shares

Beyond GSA G2S Standards: The Security Program

· By Kathy Doolittle · 0 Comments

Last month, I wrote about applying a strategic view of security as you move your gaming environment toward GSA/Open G2S standards. While these standards do specify networking standards and some security protocols, particularly for G2S, they don’t really discuss best practices in security in the overall gaming environment.

Continue reading 0 Shares

The Many Forms of Education at the RSA Conference

· By Michael Farnum · 0 Comments

This year, I attended my fifth RSA Conference. I have been to RSA events with grand themes such as 1920s-era gangsters, a cryptographer from ancient India, Edgar Allen Poe, and others. 

Continue reading 0 Shares

Thinking Strategically on GSA Gaming Standards Security

· By Kathy Doolittle · 0 Comments

As the gaming industry moves further toward open-source Gaming Standards Association (GSA) standards for lowering costs and risks while increasing interoperability and marketing opportunities, it’s important to not just focus on point solutions to meet the standards for operations, but to identify opportunities to strategically increase security and interoperability.

Continue reading 0 Shares

Bring Your Own Device – Boom or Bust?

· 0 Comments

The idea of “Bring your own device” (BYOD) is nothing new, but with the advancement of certain technologies it’s a definite possibility for businesses. Consumers have access to a great many cutting-edge technologies that they want to bring with them into the workplace. The question though “Is it right for your business?”

Continue reading 0 Shares

Overcoming Buffer Overflows: A real world case study

· By Shawn Asmus · 0 Comments

I recently performed a manual source code review of an application module written in C. The initial code base was riddled with buffer overflow vulnerabilities. There were over 1,000 instances of calls to strcpy, strcat, sprintf, gets and a few other “unsafe” functions. .

Continue reading 0 Shares

Winning With VBA Macros

· By Chris Patten · 0 Comments

As pen-testers, it is often that we come across obstacles; the technical adversaries that keep us from getting our prize in the cracker jack box. This seems to be prominent no matter if the engagement is a perimeter, enterprise, or social engineering assessment.

Continue reading 0 Shares

ISAG Part 2: Access Governance 101

· By Robert Block · 0 Comments

We will be posting excerpts from select Identity Strategy and Advisory Group (ISAG) briefings. Part 2 below is transcribed from a recent briefing that took place via conference call, which is why it takes a conversational tone.

Continue reading 0 Shares
(508 Results)

Get In Touch

Whether you are looking for general information or have a specific question, we want to help.

Contact Us