Posts by Optiv

How to Defend vs Go365 — The Microsoft 365 Password Spraying Tool

Go365 is a password-guessing cyberattack tool used to target Microsoft 365 customers. Optiv Security recommends these Office 365 security steps.

Cybersecurity Risk Assessments: Why to Embrace a Three-Tiered Approach

A three-tier approach to cybersecurity risk management can improve risk communication & risk reduction and reduce risk management costs over time.

How to Address Third Party Risk

As you add partners, networks, and systems, your level of general cyber risk gets compounded. Optiv Security explains how to mitigate that third-party risk.

Energy Sector Critical Infrastructure: The Hacker Perspective

How threat actors target and attack critical energy infrastructure, and how they achieve success, according to Optiv Security’s analysis.

Enterprise Security Operations: 3 Areas to Focus

How to focus your remote end-users on proper email security, tool configuration and chat interactions. Optiv Security explains.

California Consumer Privacy Act (CCPA): What You Need to Know

Eight steps organizations should take before CCPA (California Consumer Privacy Act) enforcement begins, according to Optiv Security.

Zero Trust Security Explained

The Zero Trust information security model is gaining popularity for three key reasons, Optiv Security explains.

Measuring Cybersecurity ROI Part 2: Cost Savings, Decreasing M&A Risk

Proper cybersecurity dramatically reduces the risk associated with mergers and acquisitions, Optiv Security explains.

Measuring Cybersecurity ROI Part 1: The Value of Mitigating Risk

Security leads need to articulate the value of their operations to leadership. Optiv explains how to get started.

Machine Learning: Make Cybersecurity a Priority

Security should be built in to cover ML (machine learning) systems and connection points from end to end, Optiv explains.