Image
managing_custom_roles_list_476x210

July 05, 2018

While using Azure role-based access controls, Microsoft provides a set of built-in roles to meet the needs of providing least privileges. These roles....

Blog

Image
phishing_rest_of_story_list_476x210

May 29, 2018

Receiving an email lure designed to trick you into clicking a phishing link and then logging into a fake website has become a common threat. In this....

Blog

Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?