Image
SZ_Kubernetes-Information-Clusters_476x210_Red

June 17, 2021

Optiv highlights the attack strategy of using forged Kerberos tickets to compromise a domain, and provides ways to defend against it.

Blog

Image
Endpoint_Protection_and_EDR_bk5

March 18, 2021

Given Office product functionality, it’s possible for adversaries to leverage Outlook's COM interface in attacks for extended persistence.

Blog

Image
security_of_collaboration_tools_list_bk8_476x210

February 17, 2021

Captcha images don’t provide robust protection as a primary security control. This analysis explores how to prevent automated (bot) attacks.

Blog

Image
List-Section-Thumbail-Image_476x210

December 16, 2020

We provide a comprehensive suite of Payment Card Industry Data Security Standard services that help you plan, build and run your compliance program.

Download

Image
ApplicationTestingBlog_List-Section-Thumbail-Image_476x210

October 13, 2020

Application threat modeling decomposes application architecture into security-relevant components to reveal threats and potential risks.

Blog