Optiv Blog

The Need for Augmented Intelligence

· By Ken Dunham · 0 Comments

Cyber threat intelligence can be a lot harder than you think. As a regular speaker at various conferences, I’m constantly asked the question about how to get started in the world of cyber threat intelligence. The answer lies in assessing your own maturity and readiness before you consider cyber threat intelligence.

Continue reading 0 Shares

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 19

· By Dan Kottmann · 0 Comments

Protect the organization’s information, as well as its reputation, by developing and implementing an incident response infrastructure (e.g. plans, defined roles, training, communications, management oversight) for quickly discovering an attack and then effectively containing the damage, eradicating the attacker’s presence and restoring the integrity of the network and systems.

Continue reading 0 Shares

Actionability Doesn’t Mean I Have to do More Work!

· By Ken Dunham · 0 Comments

“Actionability” is something we are starting to hear more and more from industry sales and marketing, but often doesn’t translate into reality for various components of cyber threat intelligence programs and services.

Continue reading 0 Shares

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 15

· By Steven Darracott · 0 Comments

The processes and tools used to track, control, prevent and correct the security use of wireless local area networks (LANs), access points and wireless client systems.

Continue reading 0 Shares

No One Plans to Fail, but Many Fail to Plan

· By Dawn-Marie Hutchinson · 0 Comments

In the information security community, we talk often about incident response plans and the need to conduct regular tabletop exercises. Where we fail is to prepare at the enterprise level. What happens when your corporate policy prohibits retainer services for technology work, but you need a technical first-response team? What is your enterprise approval policy for high dollar value expenditures?

Continue reading 0 Shares

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 3

· By Joshua Platz · 0 Comments

Actively manage (inventory, track, and correct) all software on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution.

Continue reading 0 Shares

Next Generation Identity and Access Management (Next Gen IAM)

· By Robert Block · 0 Comments

Having spent the last 17 years in the identity and access management (IAM) space, I know two things are certain: Evolution is inevitable, and change is constant. Functions, maturity, risks, trends and buying patterns all continue to evolve, mature and adjust to market conditions. One major change that has been underway is the entry point into identity management for clients.

Continue reading 0 Shares

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 1

· By Joshua Platz · 0 Comments

Security is hard. Organizations are facing a growing threat, and breaches are becoming commonplace, even happening to companies trying to do everything the right way. The old motto goes, “The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe.” It’s hard to do business like that. So what can you do? It starts with implementing a mature security program to address known attack vectors.

Continue reading 0 Shares

Endpoint Protection in the Cloud Era

· By Lee Gitzes · 0 Comments

Over the last several years there has been a major paradigm shift to a cloud computing model for enterprise computing. This new model has allowed a level of service, availability and scale that has never been seen before. As organizations have made the shift, many of the traditional management and security models have been upended and what used to work, no longer does.

Continue reading 0 Shares

High 5 for iOS 9

· By Jonathan Ross · 0 Comments

It’s September, and as we say farewell to summer, we anticipate another iOS update coming over the horizon. While this time of year can be stressful for enterprises that support corporate-owned and BYOD iOS devices, this also is a time to look forward to the latest and greatest business features expected from iOS 9.

Continue reading 0 Shares
(121 Results)