What Can We Help You Find?

July 14, 2025
AI has reshaped the threat landscape, compelling CISOs to rethink their cybersecurity strategies. Discover the strategic priorities of CISOs in 2025....
Blog

July 10, 2025
Identity is the new perimeter. Learn how Varonis Identity Protection closes gaps in identity and data security and ensures your organization stays....
Blog

July 03, 2025
Optiv's Global Threat Intelligence Center (gTIC) analyzes the increase in ransomware victims and variants, outlining key trends, threat actors and the....
Blog

January 02, 2025
How can you maximize the ROI of vulnerability management tools? Read how to measure, implement and communicate actionable risk management strategies.
Blog

December 16, 2024
Optiv's Global Threat Intelligence Center (gTIC) recaps top adversary tactics aligned to MITRE ATT&CK™ and shares proactive risk management guidance.
Blog

December 05, 2024
Learn why the Zone-Based Incident Recovery Model is the accepted best practice for organizations to quickly recover from large-scale cyber incidents.
Blog

December 05, 2024
Don’t get locked out of your M365 tenant in an emergency. Review our best practices for emergency access accounts in Entra ID.
Blog

October 04, 2024
AI Security is more than you think. Optiv helps provide a security-first approach with services designed to adopt, build and optimize AI products.
Video

September 18, 2024
Securing OT networks does not have to break the bank. Learn five budget-friendly OT networking improvements recommended for small manufacturers.
Blog

September 11, 2024
Want to transition into a penetration testing career, but don't know where to start? Learn key preparation steps to land your dream job.
Blog

August 02, 2024
Discover how AI models are susceptible to poisoning and trojaning, as well as how AI model scanners can prevent these attacks.
Blog

June 06, 2024
Communication skills are often overlooked in vulnerability management. See Optiv's advice for approaching VM concerns with empathy to improve....
Blog