Optiv Blog

The Aftermath of Meltdown and Spectre: Now What?

· By Michael Lines · 0 Comments

The recent unveiling of the widely reported Meltdown and Spectre attacks, which exploit critical vulnerabilities in modern processors, sent many within and outside the security industry into a tizzy. In the days following their public announcement, companies are struggling to understand the scope of the issue, their vulnerability and what they can do about it.

Continue reading 0 Shares

The Fundamentals of Identity and Access Management

· By Janel Schalk · 0 Comments

Identity and access management (IAM) is an exciting world filled with dreams of business enablement while reducing risks and implementing security policies and processes. However, it can be daunting to educate, prioritize, pick and implement solutions, and then maintain all of it with thoughtful governance.

Continue reading 0 Shares

Regarding Spectre and Meltdown

· By Michael Belton · 0 Comments

On January 3, 2018, the Graz University of Technology released their papers on identified vulnerabilities dubbed “Meltdown” and “Spectre” via the website https://meltdownattack.com. Within the papers, they went over these critical vulnerabilities that could be exploited in modern processors from hardware bugs that would allow programs to steal data that is currently being processed on the computer. These exploits affect desktop, laptop, cloud computing and smartphone platforms.

Continue reading 0 Shares
(3 Results)