Skip to main content

September 19, 2019

What are the top technologies to watch?

What technology should you look at investing in? Endpoint? Zero Trust Architecture? Security Awareness Training? SOAR? Digital transformation, which ...

See Details

September 12, 2019

Some of the top cybersecurity technology buying trends

Keeping up with and evaluating cybersecurity technologies can be a continuous and ongoing challenge for organizations. To make this effort easier, Opt...

See Details

September 05, 2019

Optiv Associates: Welcoming the Next Generation

Optiv acknowledges the extraordinary need for security professionals, which is why we’ve decided to create Associate level positions. These roles allo...

See Details

September 03, 2019

Cybersecurity: Lost Your Keys?

From time to time we all lose our keys. The solution for physical keys is simple – find the spare set and head down to your local hardware store so th...

See Details

August 20, 2019

Is your organization GDPR Compliant? Use a checklist

Most major organizations are already fully compliant with GDPR. However, some may just now be launching into European markets, and others may have fai...

See Details

August 13, 2019

22 ways to protect yourself against phishing attacks

Hackers are clever and are always innovating new ways to breach cybersecurity defenses, so no single tactic is likely to afford 100% protection. But o...

See Details

June 05, 2019

Protect Yourself from BYOT (Bring Your Own Threat)

With the increase in mobile and remote work environments, organizations can be at risk or under threat by not securing devices, access and credentials...

See Details

April 17, 2019

MythBusters: Debunking Five Common Identity and Data Management Myths

Debunking common myths about IDM. Examples: too expensive and complex; current IT teams can't support IDM evolution; custom is better; company data/IP...

See Details

April 09, 2019

Network Trust: How to Maintain and Establish it in Your Perimeter

Everyone has heard about “the expanding attack surface” and the “ever-increasing amounts of data;” about employees wanting to access email on their ow...

See Details