Optiv Blog

Do You Know Where Your Evidence Is? 

· By Jeff Wichman ·

In part two of our series focused on the Enemy Perspective, we’ll focus on an important element of incident response: digital forensics investigations. The digital forensics and incident response (DFIR) world continues to evolve on a yearly basis.

Continue reading

Staying Cyber Safe During Digital Transformation

· By Anthony Diaz ·

It’s October and that means National Cyber Security Awareness Month (NCSAM) is upon us. This annual initiative raises awareness about the importance of cyber security. We, at Optiv, know that cyber security is top of mind for enterprise security teams year round. So, for us NCSAM isn’t just 31 days. We live and breathe cyber security every day, 365 days a year, it’s in our DNA. To that end, we will be featuring a video and related blog each week this month to highlight top security challenges and recommend best practices to overcome them.

Continue reading

Intro to Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™ Series)

· By Joshua Platz ·

This series is focused on the risk associated with attacks which leverage vulnerabilities that could have been mitigated through the implementation of a control.

Continue reading

Data is the New Currency 

· By J.R. Cunningham ·

In today’s digital world, data is currency. Nowhere does this phenomenon show itself more clearly than in the world of payment transactions. Payment forms have taken a variety of identities from mobile pay, cryptocurrency, stored transactions, in-app transactions, money transfer apps, etc. And, yes, credit cards are still used, albeit with a few new features such as chip and pin number.

Continue reading

The Necessity of Enemy Perspectives: The Enemy Gets a Vote

· By Danny Pickens ·

The enemy gets a vote. The current Secretary of Defense and retired Marine Corps General James Mattis is fond of this observation. However, in many areas, and especially in cyber security, it rings true. The enemy does get a vote. Good network hygiene, and ensuring that you have the latest technology only goes so far. What is necessary, is opening up the view of the cyber security staff to the enemy’s perspective and gaining an understanding of their capabilities.

Continue reading

Gaining Efficiencies in a Cyber Security Ecosystem

· By Todd Weber ·

In cyber security, with threat attack surfaces growing larger each day because of cloud, mobile, social media and IoT, it’s harder than ever to keep track of what’s going every moment. How can you know what tools you need, where to automate and when you need human eyes? It is a delicate combination leading to the ideal state every organization aspires to: Efficiency.

Continue reading

Intelligence Bulletin – India Hiring Proxy

· By gTIC ·

On June 4, 2018, Optiv gTIC Human Intelligence (HUMINT) cell contacted an India-based individual providing interview-proxy services for job applicants in the US and elsewhere. The individual provided details of his services, pricing structure, areas of expertise, as well as a link to his Google Drive where he stored videos of previous interviews as a “proof-of-concept” of his services. This type of service is assessed to be common practice and poses a risk to information security organizations due to the risk of unqualified candidates being improperly hired.

Continue reading

Skills Gap – Hiring When There’s No People

· By Optiv ·

While part of the solution to a robust and complete security program is security automation and orchestration (SAO), do not forget that hackers are human and therefore require white hat humans to think like them. There’s no way to remove human hands to help solve it. But this creates the other problem: Finding the right people with the right cyber security skills during a much-lamented skills shortage.

Continue reading

Employees’ Contribution to Breach of Trust

· By Peter Gregory ·

This is a follow up article to our earlier blog post, Thoughts on Breach of Trust vs. Breach of Security. In his Optiv blog article, Mitch Powers stated that 1 in 5 employees would be willing to sell their password to an outside party. Is this a potential contributor to a breach of trust between organizations? Could such employees be identified prior to or during employment?

Continue reading

Getting Started with Postman for API Security Testing: Part 2

· By Rushyendra Reddy Induri ·

Postman is a useful tool used by many developers to document, test and interact with Application Programming Interfaces (APIs). This post will explore a couple of use cases for security testing, such as using data-driven tests (Postman Collection Runner) for parameter fuzzing and using the Postman Sandbox JS execution (Pre-request Script) environment for Hashed Message Authentication Code (HMAC) Header Implementation.

Continue reading
(694 Results)