Optiv Blog

Virtualized Security Works Best When it’s Built on the Basics

· By Andrew Brink · 0 Comments

Industry analyst firm Gartner says that virtualization projects are currently the number one priority for CIOs.  Yet Gartner also reports that, “Through 2012, 60 percent of virtualized servers will be less secure than the physical servers they replace.”  Why is there such a significant disconnect between virtualization and security?

Continue reading 0 Shares

Online Shopping Can Compromise Your Identity

· By Ryan Smith · 0 Comments

Last year, identity theft raked as the number one consumer complaint category with 1.3 million people falling victim to the crime, according to the Federal Trade Commission (FTC).

Continue reading 0 Shares

How Much of a Security Concern is Cloud Computing Really?

· By Ryan Smith · 0 Comments

Before cloud computing had even gotten off the ground, people were talking about the security implications of computing in the cloud. When you step down from the semantic sugar and look at the basics, cloud computing is not fundamentally different from any other technology.

Continue reading 0 Shares

Monitoring Your Networks and Systems Can Save you A Lot of Heartache

· By Chris Morales · 0 Comments

In my last blog posting, I shared with you some long-term strategies to help you change user behavior so that you can more quickly find malware infections and mitigate the loss of information associated with a breach. You can address the current infection of systems by monitoring for malware in three areas: external network monitoring, internal network monitoring and system monitoring.

Continue reading 0 Shares

Changing User Behavior is Key to the Malware Protection Process

· By Chris Morales · 0 Comments

My colleague, Ryan Smith, recently wrote about Defense in Depth and talked about the fact that, regardless of how many tools and techniques an organization implements to prevent infection through malware, they won’t be able to stop every infection.

Continue reading 0 Shares

If You Are Attending Ekoparty in Argentina...

· By Chris Valasek · 0 Comments

Hello internet-sphere, My name is Chris Valasek and I’m the newest edition to the Accuvant LABS research team. I will be working alongside Chief Research Scientist Ryan Smith on a variety of subjects. While I mainly do reverse engineering and exploitation related work, we have plans to work on a wide array of internet awesomeness.

Continue reading 0 Shares

PCI DSS 2.0 is on the Horizon

· By Brian Serra · 0 Comments

A new version of the PCI Data Security Standard (PCI-DSS) is targeted for release in October. A lot of companies are aware that the revised standard is coming out, and many of our clients have been asking us what the revisions will entail, and what they’ll mean to them.

Continue reading 0 Shares

Malware Mitigation Trends: Utilizing the Latest Weapons Against the Modern Malware Threat

· By Steve Richards · 0 Comments

In the malware mitigation market, there are divisions among the vendors. The perspective of the vendor, detection philosophy and technology approaches are examples of the vendors’ different views. Most legacy network security devices have developed some semblance of controls to fight malware. 

Continue reading 0 Shares

Learning About NAC From Higher Education

· By Jason Prost · 0 Comments

Network Access Control (NAC) is something that people are talking about everywhere, whether they realize it or not. It’s not that they are determining how to utilize standards such as 802.1X, IF-MAP and MS-NAP, or marveling at how cool and exciting they might be.

Continue reading 0 Shares

Is DiD Really the Way?

· By Ryan Smith · 0 Comments

It’s a pretty well known fact that an attacker with sufficient means and motive has the potential to bypass every security measure you put in place. As a countermeasure to this belief, people often propose Defense in Depth (DiD), believing that by implementing layers of security controls at various logical and physical tiers within an organization, they can reduce security risk.

Continue reading 0 Shares
(28 Results)