Optiv Blog

Actionability Doesn’t Mean I Have to do More Work!

· By Ken Dunham · 0 Comments

“Actionability” is something we are starting to hear more and more from industry sales and marketing, but often doesn’t translate into reality for various components of cyber threat intelligence programs and services.

Continue reading 0 Shares

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 15

· By Steven Darracott · 0 Comments

The processes and tools used to track, control, prevent and correct the security use of wireless local area networks (LANs), access points and wireless client systems.

Continue reading 0 Shares

No One Plans to Fail, but Many Fail to Plan

· By Dawn-Marie Hutchinson · 0 Comments

In the information security community, we talk often about incident response plans and the need to conduct regular tabletop exercises. Where we fail is to prepare at the enterprise level. What happens when your corporate policy prohibits retainer services for technology work, but you need a technical first-response team? What is your enterprise approval policy for high dollar value expenditures?

Continue reading 0 Shares

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 3

· By Joshua Platz · 0 Comments

Actively manage (inventory, track, and correct) all software on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution.

Continue reading 0 Shares

Next Generation Identity and Access Management (Next Gen IAM)

· By Robert Block · 0 Comments

Having spent the last 17 years in the identity and access management (IAM) space, I know two things are certain: Evolution is inevitable, and change is constant. Functions, maturity, risks, trends and buying patterns all continue to evolve, mature and adjust to market conditions. One major change that has been underway is the entry point into identity management for clients.

Continue reading 0 Shares

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 1

· By Joshua Platz · 0 Comments

Security is hard. Organizations are facing a growing threat, and breaches are becoming commonplace, even happening to companies trying to do everything the right way. The old motto goes, “The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe.” It’s hard to do business like that. So what can you do? It starts with implementing a mature security program to address known attack vectors.

Continue reading 0 Shares

High 5 for iOS 9

· By Jonathan Ross · 0 Comments

It’s September, and as we say farewell to summer, we anticipate another iOS update coming over the horizon. While this time of year can be stressful for enterprises that support corporate-owned and BYOD iOS devices, this also is a time to look forward to the latest and greatest business features expected from iOS 9.

Continue reading 0 Shares

Why Do They Call It DLP?

· By Colby Clark · 0 Comments

I always have to ask myself every time I hear the acronym “DLP.” Why do they call it that? There is no “prevention” in most DLP. It should be called DLT --> Data Loss Tracking. Think about it for a moment, aside from enabling you to see who stole your data, most solutions don’t do anything at all to actually “prevent” it from being taken.

Continue reading 0 Shares

GHOST Vulnerability Puts Linux Systems at Risk

· By Alain Iamburg, Andrew McGregor · 0 Comments

A critical security vulnerability in the GNU C library, CVE-2015-0235 (a.k.a. “GHOST”), was reported on January 27, 2015. Many Linux systems are vulnerable to remote code execution, including enterprise and Long Term Support distributions. How serious is the risk?

Continue reading 0 Shares

DDoS Attacks Are Seldom What They Seem

· By Colby Clark · 0 Comments

In performing incident response over the years, I have frequently been pulled into DDoS incidents. These calls don’t come in every day, but they are pretty common. In fact, this probably happens about once every two or three weeks. In most situations, the customers are primarily concerned about the obvious problems of network/system availability and the capability to conduct business.

Continue reading 0 Shares
(118 Results)