A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
OPTIV/SOURCE ZERO Latest news and research on red and blue team security capabilities, objective tool analysis and step-by-step solutions. The Source Zero® platform provides a space for the Optiv community to share their knowledge, research and tools. See our newest insights on subjects ranging from ethical hacking to threat intelligence to application security. Image Search Terms Type - Any -BlogToolVideo Team - Any -RedBluePurple/No Team Sort By LatestOldest Image Endpoint Detection and Response: How Hackers Have Evolved February 02, 2021 This post identifies systemic endpoint detection and response issues and examines how attackers can bypass any EDR product. See Details Blog Image The Evolution of Cloud Forensics and Incident Response February 01, 2021 Toolsets have evolved for high-fidelity forensics and investigations – here we map them to the MITRE ATT&CK framework for Enterprise Cloud. See Details Blog Image Abusing AirWatch MDM Services to Bypass MFA December 11, 2020 Our team describes how single-factor authentication attack surfaces can be exposed in the AirWatch MDM suite and what steps to take to mitigate risks. See Details Blog Image Certificate Validation Disabled in Black Duck API Wrapper November 05, 2020 A security vulnerability has been found in the Black Duck Hub REST API Python project (“blackduck” in the PyPI repository). Read more. See Details Blog Image Copying Updated WinAutomation Databases for RPA With Azure Custom Script Extensions November 04, 2020 How to copy updated WinAutomation databases for RPA with Azure custom script extensions – part five of a series. See Details Blog Image Robotic Process Automation with WinAutomation November 04, 2020 Part four in the series: setting up RPA with WinAutomation. See Details Blog Image Tearing Down Azure Resources and Replying to Emails Using Power Automate Flows and Azure Runbooks November 04, 2020 How to use Power Automate flows and Azure runbooks to tear down Azure resources and reply to emails – Dan Kiraly explains in part 7 of the series. See Details Blog Image Assigning Specific Public IP Addresses With Azure Automation Runbook November 04, 2020 How to assign a specific public IP address using Azure Automation runbook. Part three in a series. See Details Blog Image Uploading WinAutomation Screenshots to Azure Container Storage Using Invoke-AzVMRunCommand November 04, 2020 How to upload WinAutomation screenshots to Azure Container Storage using Invoke-AzVMRunCommand – part six in a series. See Details Blog Image Provisioning RPA Test Environments With Azure Automation Runbooks November 04, 2020 How to provision a test environment for robotic process automation with Azure automation runbooks: part two in a series. See Details Blog Image Using Microsoft Flows and UI Flows for Patch and Software Testing November 04, 2020 Can user workflow verification be tested in an automated fashion using Microsoft Power Automate Flows, UI Flows and Automation Runbooks? See Details Blog Image There's Gold in Them Thar Metadata!! September 30, 2020 Hackers can use the username structure and deployed technologies in an online document’s metadata to successfully breach the perimeter. See Details Blog Pagination First page « First Previous page ‹ Previous … Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Current page 10 Page 11 Page 12 Next page Next › Last page Last » Introducing Source Zero Our new technical cybersecurity thought leadership resource, Source Zero, focuses on red and blue team security capabilities, objective tools analysis, and more.
Image Endpoint Detection and Response: How Hackers Have Evolved February 02, 2021 This post identifies systemic endpoint detection and response issues and examines how attackers can bypass any EDR product. See Details Blog
Image The Evolution of Cloud Forensics and Incident Response February 01, 2021 Toolsets have evolved for high-fidelity forensics and investigations – here we map them to the MITRE ATT&CK framework for Enterprise Cloud. See Details Blog
Image Abusing AirWatch MDM Services to Bypass MFA December 11, 2020 Our team describes how single-factor authentication attack surfaces can be exposed in the AirWatch MDM suite and what steps to take to mitigate risks. See Details Blog
Image Certificate Validation Disabled in Black Duck API Wrapper November 05, 2020 A security vulnerability has been found in the Black Duck Hub REST API Python project (“blackduck” in the PyPI repository). Read more. See Details Blog
Image Copying Updated WinAutomation Databases for RPA With Azure Custom Script Extensions November 04, 2020 How to copy updated WinAutomation databases for RPA with Azure custom script extensions – part five of a series. See Details Blog
Image Robotic Process Automation with WinAutomation November 04, 2020 Part four in the series: setting up RPA with WinAutomation. See Details Blog
Image Tearing Down Azure Resources and Replying to Emails Using Power Automate Flows and Azure Runbooks November 04, 2020 How to use Power Automate flows and Azure runbooks to tear down Azure resources and reply to emails – Dan Kiraly explains in part 7 of the series. See Details Blog
Image Assigning Specific Public IP Addresses With Azure Automation Runbook November 04, 2020 How to assign a specific public IP address using Azure Automation runbook. Part three in a series. See Details Blog
Image Uploading WinAutomation Screenshots to Azure Container Storage Using Invoke-AzVMRunCommand November 04, 2020 How to upload WinAutomation screenshots to Azure Container Storage using Invoke-AzVMRunCommand – part six in a series. See Details Blog
Image Provisioning RPA Test Environments With Azure Automation Runbooks November 04, 2020 How to provision a test environment for robotic process automation with Azure automation runbooks: part two in a series. See Details Blog
Image Using Microsoft Flows and UI Flows for Patch and Software Testing November 04, 2020 Can user workflow verification be tested in an automated fashion using Microsoft Power Automate Flows, UI Flows and Automation Runbooks? See Details Blog
Image There's Gold in Them Thar Metadata!! September 30, 2020 Hackers can use the username structure and deployed technologies in an online document’s metadata to successfully breach the perimeter. See Details Blog
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?