Image
CyberOps_Evolution_CyberCrime_list_476x210_overlay

July 18, 2019

Fayyaz Rajpari, our Executive Services Director discusses this evolution with Ron Darnall, our senior direct of threat intelligence and Ken Dunham....

Blog

Image
Threat_ATT&CK-Series-Exfiltration_list-476x210_overlay

July 16, 2019

In this post, we will address some of the MITRE ATT&CK’s Exfiltration techniques and tactics, from an attacker’s point of view, that may be used to....

Blog

Image
Threat_Will-the-real-SDP-please-Stand-up_Blog-post-Images-list-476x210

July 10, 2019

The term Software Defined Perimeter (SDP) has recently gained popularity and represents a new and agile way to provide secure access in a Zero Trust....

Blog

Image
Endpoint_testing_list_476x210

June 13, 2019

Endpoint security solution providers continue to race toward the same goal—a multifunctional platform that includes prevention, detection, response....

Blog

Image
Is-your-IDM-Tech-Healthy_list_476x210

June 12, 2019

So, is your IDM programme healthy? If it is built to implement a holistic and strategic vision for identity governance and administration across your....

Blog

Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?