Optiv Blog

Top 20 CIS Critical Security Controls Through the Eyes of a Hacker – CSC 10

· By Ralph May · 0 Comments

The processes and tools used to properly back up critical information with a proven methodology for timely recovery of it.

Continue reading 0 Shares

Top 20 CIS Critical Security Controls Through the Eyes of a Hacker – CSC 9

· By Chris Ballentine · 0 Comments

Manage (track/control/correct) the ongoing operational use of ports, protocols and services on networked devices in order to minimize windows of vulnerability available to attackers.

Continue reading 0 Shares

Top 20 CIS Critical Security Controls Through the Eyes of a Hacker – CSC 8

· By Joshua Platz · 0 Comments

Control the installation, spread, and execution of malicious code at multiple points in the enterprise, while optimizing the use of automation to enable rapid updating of defense, data gathering, and corrective action.

Continue reading 0 Shares

Five Key Tips To Improve Your Company’s Cyber Security Culture

· By Doug Hall · 0 Comments

An organization’s biggest threat may not come from far away hackers but from its own employees. Your first line of defense is to develop a cyber security culture within your organization that embraces and rewards the adoption of good cyber security behavior. Remember, it’s not just up to the IT department – the entire company must work together.

Continue reading 0 Shares

Threat Advisory – Single Sign-On Phishing

· By Nicolle Neulist · 0 Comments

Recently, Optiv’s Global Threat Intelligence Center (gTIC) identified an active phishing campaign against the education sector, in which attackers are stealing credentials and using them to redirect direct deposit paychecks to attacker-controlled accounts. Users are being tricked into entering their single sign-on (SSO) information into a portal that is made to look like the real one, but is controlled by the attacker.

Continue reading 0 Shares

Top 20 CIS Critical Security Controls Through the Eyes of a Hacker – CSC 7

· By Joshua Platz · 0 Comments

Minimize the attack surface and the opportunities for attackers to manipulate human behavior through their interaction with web browsers and email systems.

Continue reading 0 Shares

Top 20 CIS Critical Security Controls Through the Eyes of a Hacker – CSC 6

· By Joshua Platz · 0 Comments

Collect, manage, and analyze audit logs of events that could help detect, understand, or recover from an attack.

Continue reading 0 Shares

Identity Protection Tips for Your Graduate

· By Doug Hall · 0 Comments

College students are five times more likely to become victims of identity theft than any other demographic, according to The Financial Times. Experts in the security industry say there are two key reasons college students are at greater risk.

Continue reading 0 Shares

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 5

· By Joshua Platz · 0 Comments

The processes and tools used to track/control/prevent/correct the use, assignment, and configuration of administrative privileges on computers, networks, and applications.

Continue reading 0 Shares

Identity Defined Security Alliance: Making an Identity Centric Approach to Security a Reality

· By Robert Block · 0 Comments

Today, the Identity Defined Security Alliance (IDSA), led by Ping Identity and Optiv, announced a giant step forward in making the next generation of IAM, Identity Defined Security, a reality. Before I jump into the details of what was announced, I wanted to describe why we think an identity-centric approach to security is critical to a successful security strategy.

Continue reading 0 Shares
(476 Results)

Get In Touch

Whether you are looking for general information or have a specific question, we want to help.

Contact Us