Image
ATT&CK_Series_Persistence_list_476x210

April 02, 2019

In this post, we will cover ATT&CK’s Persistence techniques and tactics that an attacker may employ to maintain their presence following initial....

Blog

Image
conversations_with_the_board_list_476x210

March 26, 2019

Building and maintaining a world-class cybersecurity program is about partnering with the people who have the most influence, C-suite executives and....

Blog

Image
business_centric_risk_list_476x210

March 12, 2019

Many organizations are reaching a breaking point when it comes to the effectiveness of their cybersecurity. Security teams are overwhelmed with the....

Blog

Image
ATT&CK-Discovery_list_476x210

March 07, 2019

Modern information technology has rocketed the business sector to impressive heights, as innovative devices and software solutions are implemented....

Blog

Image
learning_the_enemies_perspectives_list_476x210

February 26, 2019

Make offensive security games, and regular penetration testing part of your ongoing threat management program and your team will gain knowledge to be....

Blog

Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?