A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Image #AskOptiv: Defending Against AI Weaponized Threats February 05, 2020 How cybersecurity organizations position and defend themselves with respect to AI will separate survivors from victims. See Details Blog
Image Optiv ThreatDNA® Platform and ThreatBEAT® Service December 19, 2019 The need for intelligence-driven operations resulted in Optiv’s Global Threat Intelligence Center (gTIC). In 2020, our intelligence operations will.... See Details Blog
Image Nemty Ransomware Deployed via Payment Service Phish November 05, 2019 In late August, a new ransomware strain, Nemty, was distributed in the wild. It, coupled with a multitude of other ransomware threats in 2019, demands.... See Details Blog
Image Retro Risk Appetite August 27, 2019 Accepted risk is all too often the result of a lack of priorities around managing risk. It’s all too easy to say “We don’t want to spend $50,000 USD.... See Details Blog
Image Managing Security with MITRE ATT&CK July 30, 2019 Optiv has been using the MITRE Adversary Tactics and Techniques and Common Knowledge (ATT&CK) framework to help clients strategically manage.... See Details Blog
Image The Evolution of Cybercrime July 18, 2019 Fayyaz Rajpari, our Executive Services Director discusses this evolution with Ron Darnall, our senior direct of threat intelligence and Ken Dunham.... See Details Blog
Image Business Email Compromise (BEC) Fraud is Exploiting the Cloud May 09, 2019 Business Email Compromise (BEC) fraud has been officially tracked by the FBI since 2013 and has been identified in more than 100 countries with losses.... See Details Blog
Image Features of a Threat Intelligence Platform February 14, 2019 A Threat Intelligence Platform (TIP) is a fantastic way to manage intelligence and its process amongst individual teams and communities, including.... See Details Blog
Image IoC and IoA: Indicators of Intelligence January 24, 2019 Intelligence seems to be full of three-letter acronyms, including Indicators of Compromise (IoC) and Indicators of Attack (IoA). The difference.... See Details Blog
Image SecOps vs. DevOps in the Information Age December 18, 2018 Information is varied and complex, involving many data types, structures, and protocols for different types of data sets. This increases challenges.... See Details Blog
Image Darknet Done Right December 11, 2018 The marriage of a well-managed risk program and a targeted Darknet operation to move towards mitigation of risk is an ROI most mature companies have.... See Details Blog
Image Titanic - Lessons Learned for Cyber Security October 31, 2018 Computer security professionals are all too familiar with the “cat and mouse” game seen on the global stage of the enemy and defenders. History does.... See Details Blog