OPTIV/SOURCE ZERO

 

Latest news and research on red and blue team
security capabilities, objective tool analysis
and step-by-step solutions.

The Source Zero® platform provides a space for the Optiv community to share their knowledge, research and tools. See our newest insights on subjects ranging from ethical hacking to threat intelligence to application security.

 

Image
SZ_Tool-sprawl3_476x210_Blue.jpg

Vulnerability Management Hacks to Improve ROI

January 02, 2025

How can you maximize the ROI of vulnerability management tools? Read how to measure, implement and communicate actionable risk management strategies.

Image
SZ_Security-technology-education_476x210_Blue.jpg

Optiv’s gTIC 2024 Assessment and 2025 Forward Estimates

December 16, 2024

Optiv's Global Threat Intelligence Center (gTIC) recaps top adversary tactics aligned to MITRE ATT&CK™ and shares proactive risk management guidance.​

Image
SZ_Cyber-Threat-intelligence2_476x210_Blue.jpg

Understanding a Zone-Based Incident Recovery Model

December 05, 2024

Learn why the Zone-Based Incident Recovery Model is the accepted best practice for organizations to quickly recover from large-scale cyber incidents.

Image
SZ_Encryption2_476x210_Blue.jpg

Updated Guidance for Entra ID Emergency Access Accounts (EAAs)

December 05, 2024

Don’t get locked out of your M365 tenant in an emergency. Review our best practices for emergency access accounts in Entra ID.

Image
SZ_OT-security-operational-technology_476x210_Blue

Top Five Budget-Friendly OT Networking Improvements for Small Manufacturers

September 18, 2024

Securing OT networks does not have to break the bank. Learn five budget-friendly OT networking improvements recommended for small manufacturers.

Image
SZ_Security-technology-education2_476x210_Red.jpg

Gaining a Foothold: Transitioning into a Penetration Testing Career

September 11, 2024

Want to transition into a penetration testing career, but don't know where to start? Learn key preparation steps to land your dream job.

Image
SZ_Machine-learning_476x210_Red

Enhancing Your SDLC with AI Model Vulnerability Scanning

August 02, 2024

Discover how AI models are susceptible to poisoning and trojaning, as well as how AI model scanners can prevent these attacks.

Image
SZ_Retail-and-consumers2_476x210_Blue

Fostering Empathetic Communication in Vulnerability Management

June 06, 2024

Communication skills are often overlooked in vulnerability management. See Optiv's advice for approaching VM concerns with empathy to improve....

Image
SZ_OT-security-operational-technology_476x210_Blue

Navigating OT Networking and Security in the Cloud Era

June 03, 2024

As threats in the OT space evolve, how can security teams adapt the classic Purdue model to address business and compliance needs? Optiv shares key....

Image
SZ_Cloud-security3_476x210_Blue

Don’t Upload Your HAR Files Anywhere (And If You Do, Encrypt Them)

May 14, 2024

Optiv's Source Zero team takes you on an internet safari to hunt for HAR files and explore recommendations for defending against token theft attacks.

Image
SZ_OT-security-operational-technology3_476x210_Blue

Practical Approaches to OT SOC Monitoring

May 03, 2024

Running a SOC is challenging, and adding OT SOC monitoring into the mix brings more challenges. Read Optiv's guidance for developing a strong OT SOC....

Image
SZ_Software-development2_476x210_Blue

Strengthening the SDLC to Defend the Supply Chain

April 10, 2024

As typosquatting attacks and other threats target the software supply chain, Optiv shares tips for DevSecOps, SBOM and Zero Trust implementations or....


 

Introducing Source Zero

 

Our new technical cybersecurity thought leadership resource, Source Zero, focuses on red and blue team security capabilities, objective tools analysis, and more.