Image
ATT&CK-Series-Collection-Tactics_list_476x210

September 10, 2019

In this post, we will address some of the MITRE ATT&CK’s Collection techniques and tactics, from an attacker’s point of view to harvest organizational....

Blog

Image
Cybersecurity-Lost-Your-Keys_Blog_list_476x210_overlay

September 02, 2019

From time to time we all lose our keys. The solution for physical keys is simple – find the spare set and head down to your local hardware store so....

Blog

Image
Risk_Retro-Risk-Appetite__list_476x210_overlay

August 27, 2019

Accepted risk is all too often the result of a lack of priorities around managing risk. It’s all too easy to say “We don’t want to spend $50,000 USD....

Blog

Image
ATT&CK-Command-Control_list_476x210_overlay

August 06, 2019

In this post, we will review ATT&CK’s Command and Control techniques from an attacker’s point of view. The techniques covered here are not inclusive....

Blog

Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?