Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
Optiv Blog
optiv.com
Focused on the ever-changing information security landscape
Let’s Not Talk About the Past
optiv.com
·
50w
Security in 2019: Getting Ahead of the Game
optiv.com
·
50w
IoC and IoA: Indicators of Intelligence
optiv.com
·
50w
How Can You Determine the Risk of a Threat Actor?
optiv.com
·
50w
Features of a Threat Intelligence Platform
optiv.com
·
50w
Learning the Enemy Perspective
optiv.com
·
50w
It’s Not Always About the Perimeter – A Look at Domain Reconnaissance
optiv.com
·
50w
ATT&CK Series: Discovery
optiv.com
·
50w
The Business-Centric Risk Strategy
optiv.com
·
50w
Tales from Trenches: Cybersecurity Tool Depth and Features
optiv.com
·
50w
All the World’s a (Digital) Stage
optiv.com
·
50w
Machine Learning: Make Cybersecurity a Priority
optiv.com
·
50w
Conversations with the Board
optiv.com
·
50w
Future-Proofing your Business with Identity-Centric Security
optiv.com
·
50w
ATT&CK Series: Persistence
optiv.com
·
50w
Why Identity Matters in a Strategic Identity and Data Management Programme
optiv.com
·
50w
ATT&CK Series: Credential Access
optiv.com
·
50w
That Time I Clicked on a Phish
optiv.com
·
50w
Organizations Shift from Identity and Access Management to Identity and Data Management
optiv.com
·
50w
MythBusters: Debunking Five Common Identity and Data Management Myths
optiv.com
·
50w
« Page 14
·
Page 16 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help