A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 1 - 12 of 784 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Gaining a Foothold: Transitioning into a Penetration Testing Career September 26, 2025 Want to transition into a penetration testing career, but don't know where to start? Learn key preparation steps to land your dream job. Read the Blog Image Blog Five Ways to Protect Your Business | Optiv September 26, 2025 Your data is your most valuable asset. Protect your business from insider threats with these cyber-smart behaviors for Cybersecurity Awareness Month. Read the Blog Image Blog 8 Ways to Protect Yourself Against Phishing Attacks September 24, 2025 Don't take the bait when it comes to novel phishing lures. Optiv has eight easy steps for identifying, blocking and reporting phishing scams. Read the Blog Image Blog Closing the Gap During Cybersecurity Awareness Month: Aligning Perceived and Actual Human Risk September 24, 2025 The human element is a top factor in security breaches. Explore how business leaders can drive cultural change toward real-world concerns. Read the Blog Image Blog Cybersecurity Capabilities for Maturing Your TPRM Programs September 23, 2025 Expanding third-party ecosystems are impacting vendor network challenges. Discover trends in governance, compliance, cloud adoption, access controls.... Read the Blog Image Blog Cybersecurity Technology Investment Trends for a Resilient Business Blog3 September 18, 2025 In today’s rapidly increasing digital and threat-prone environment, cybersecurity has come to be of utmost importance to organizations across all.... Read the Blog Image Blog Third-Party Risk Management Governance Trends in 2025 September 17, 2025 As third-party cyber risks intensify, organizations are prioritizing governance in third-party risk management (TPRM). Discover key industry trends in.... Read the Blog Image Blog Lessons in Supply Chain Security from Recent Third-Party Breaches September 16, 2025 Evolving Attack Surface: Perimeter to Identity Read the Blog Image Blog Prioritized Software and Services List + MITRE Tactics Part VI August 29, 2025 Experts cover exploitation trends and vulnerabilities in popular network-attached storage (NAS) products and devices. Read the Blog Image Blog Building Resilience and Advancing Cybersecurity Capability Maturity August 21, 2025 Discover how organizations are advancing cybersecurity maturity with proactive strategies, compliance alignment and industry-leading frameworks in.... Read the Blog Image Blog The Future of Database Activity Monitoring Is Here August 14, 2025 Varonis transforms database activity monitoring, bridging gaps in structured and unstructured data security with a unified, modern approach to.... Read the Blog Image Blog Enhancing Your SDLC with AI Model Vulnerability Scanning August 07, 2025 Discover how AI models are susceptible to poisoning and trojaning, as well as how AI model scanners can prevent these attacks. Read the Blog Pagination Current page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 … Next page Next › Last page Last » Subscribe to our newsletter for cutting-edge insights Subscribe
Image Blog Gaining a Foothold: Transitioning into a Penetration Testing Career September 26, 2025 Want to transition into a penetration testing career, but don't know where to start? Learn key preparation steps to land your dream job.
Image Blog Five Ways to Protect Your Business | Optiv September 26, 2025 Your data is your most valuable asset. Protect your business from insider threats with these cyber-smart behaviors for Cybersecurity Awareness Month.
Image Blog 8 Ways to Protect Yourself Against Phishing Attacks September 24, 2025 Don't take the bait when it comes to novel phishing lures. Optiv has eight easy steps for identifying, blocking and reporting phishing scams.
Image Blog Closing the Gap During Cybersecurity Awareness Month: Aligning Perceived and Actual Human Risk September 24, 2025 The human element is a top factor in security breaches. Explore how business leaders can drive cultural change toward real-world concerns.
Image Blog Cybersecurity Capabilities for Maturing Your TPRM Programs September 23, 2025 Expanding third-party ecosystems are impacting vendor network challenges. Discover trends in governance, compliance, cloud adoption, access controls....
Image Blog Cybersecurity Technology Investment Trends for a Resilient Business Blog3 September 18, 2025 In today’s rapidly increasing digital and threat-prone environment, cybersecurity has come to be of utmost importance to organizations across all....
Image Blog Third-Party Risk Management Governance Trends in 2025 September 17, 2025 As third-party cyber risks intensify, organizations are prioritizing governance in third-party risk management (TPRM). Discover key industry trends in....
Image Blog Lessons in Supply Chain Security from Recent Third-Party Breaches September 16, 2025 Evolving Attack Surface: Perimeter to Identity
Image Blog Prioritized Software and Services List + MITRE Tactics Part VI August 29, 2025 Experts cover exploitation trends and vulnerabilities in popular network-attached storage (NAS) products and devices.
Image Blog Building Resilience and Advancing Cybersecurity Capability Maturity August 21, 2025 Discover how organizations are advancing cybersecurity maturity with proactive strategies, compliance alignment and industry-leading frameworks in....
Image Blog The Future of Database Activity Monitoring Is Here August 14, 2025 Varonis transforms database activity monitoring, bridging gaps in structured and unstructured data security with a unified, modern approach to....
Image Blog Enhancing Your SDLC with AI Model Vulnerability Scanning August 07, 2025 Discover how AI models are susceptible to poisoning and trojaning, as well as how AI model scanners can prevent these attacks.