Common Information
Type | Value |
---|---|
Value |
www.opt |
Category | |
Type | File |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-12-18 | 2 | 2023 Industry Threat Profile Insights | ||
Details | Website | 2023-12-13 | 2 | Vulnerability Management Program Fundamentals | ||
Details | Website | 2023-12-12 | 31 | Optiv’s gTIC Prioritized Software and Services List + MITRE Tactics Part V: VMware Software and Products | ||
Details | Website | 2023-12-11 | 4 | Investigating an Adversary-in-the-Middle (AiTM) Phishing Email | ||
Details | Website | 2023-12-06 | 2 | AI and ML: The Keys to Better Security Outcomes | ||
Details | Website | 2023-12-06 | 198 | Russia/Ukraine Update - December 2023 | ||
Details | Website | 2023-12-05 | 5 | One Year Later: Managing Security in the Age of ChatGPT | ||
Details | Website | 2023-12-05 | 2 | Five Ways to Stay Ahead of Ransomware | ||
Details | Website | 2023-12-01 | 2 | Unified Management is the Key to Single-Vendor SASE | ||
Details | Website | 2023-11-27 | 2 | Strengthening Identity Governance Using the SailPoint Identity Security Cloud Platform | ||
Details | Website | 2023-11-20 | 10 | Redirectors: A Red Teamer’s Introduction | ||
Details | Website | 2023-11-17 | 2 | The Cost of Reaction: Why Your Security Operations Center Needs a Prevention Overhaul | ||
Details | Website | 2023-11-16 | 2 | Identifying Quieter Attack Techniques | ||
Details | Website | 2023-11-14 | 2 | Data Classification: Optimizing Data Security | ||
Details | Website | 2023-11-03 | 5 | Vertical Target Series: Industrials and Industrial Sub-Verticals | ||
Details | Website | 2023-10-30 | 19 | Critical Vulnerabilities Affecting Prioritized Software and Services in September 2023 | ||
Details | Website | 2023-10-20 | 3 | Fighting Cybercrime: Law Enforcement vs. Hacktivists | ||
Details | Website | 2023-10-18 | 2 | Gaining a Foothold: Transitioning into a Penetration Testing Career | ||
Details | Website | 2023-10-17 | 2 | Secure Your Resilience | ||
Details | Website | 2023-10-16 | 2 | Mitigating Intentional and Unintentional Risks in Software Supply Chains | ||
Details | Website | 2023-10-12 | 2 | Answering Key Questions About Embracing AI in Cybersecurity | ||
Details | Website | 2023-10-05 | 2 | Preparing for Google’s Proposed TLS Certificate Lifespan Reduction | ||
Details | Website | 2023-10-05 | 2 | CPPA Releases Draft Cybersecurity Regulations | ||
Details | Website | 2023-10-04 | 3 | Security Tool Rationalization: A Powerful Way to Elevate Security Hygiene Amid Budget Constraints | ||
Details | Website | 2023-10-03 | 2 | Understanding API Profiles |