OPTIV/SOURCE ZERO

 

Latest news and research on red and blue team
security capabilities, objective tool analysis
and step-by-step solutions.

The Source Zero® platform provides a space for the Optiv community to share their knowledge, research and tools. See our newest insights on subjects ranging from ethical hacking to threat intelligence to application security.

 

Image
SZ_Coding-Linux_476x210.jpg

October 03, 2023

Understanding API usage and profiles is key for an organization’s security maturity. Learn how to classify API usage, exposure, data and compliance.

Blog

Image
SZ_Software-development_476x210_Red.jpg

September 26, 2023

Software operations are a key part of determining software system security. Learn to leverage OWASP SAMM to maintain the security of deployed software....

Blog

Image
SZ_Hacker-Figure-At-Screen_476x210_Red

August 25, 2023

Adversaries can utilize native tools to remain undetected by defenders. See our demo of how red and blue teamers can enhance engagements with LOLBins.

Blog

Image
SZ_Machine-learning_476x210_Red.jpg

August 04, 2023

An API inventory can identify duplicate API functionality. Read how organizations can reduce redundant development costs as they create, track and....

Blog

Image
SZ_Phishing-and-ransomware-emails2_476x210_Blue.jpg

July 17, 2023

Optiv shares insights on high-impact June '23 vulnerabilities, including critical enterprise software flaws. Read the findings to help bolster....

Blog


 

Introducing Source Zero

 

Our new technical cybersecurity thought leadership resource, Source Zero, focuses on red and blue team security capabilities, objective tools analysis, and more.

Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?