Skip to main content
Sort By:

Mastering the Hunt

Learn about methods to help accelerate threat discovery and increase cyber defenses.

See Details

Privacy Across the Pond, Part 2

From consumerization to IoT devices to a tax on chardonnay — CTO and Head of Strategy, Andrzej Kawalec and GM and Global Vice President of Digital Ide...

See Details

ATT&CK Series: Defense Evasion

There are multiple ways that an attacker can hide while attempting to access a network and move laterally within it. Windows systems often unintentio...

See Details

Business Email Compromise (BEC) Fraud is Exploiting the Cloud

Business Email Compromise (BEC) fraud has been officially tracked by the FBI since 2013 and has been identified in more than 100 countries with losses...

See Details

Privacy Across the Pond, Part 1

From privacy to identity to work-life flow — CTO and Head of Strategy, Andrzej Kawalec and GM and Global Vice President of Digital Identity and Data M...

See Details

ATT&CK Series: Execution

Once initial access has been obtained, attackers usually need a way of getting into places that their initial foothold can't get to. This can be accom...

See Details

Cyber Digital Transformation: Data Solutions for Business and Security

Optiv Data Solutions for Business and Security provides day-zero integration of platforms and services, quickly enabling clients to focus on the insig...

See Details

Organizations Shift from Identity and Access Management to Identity and Data Management

With the exponential growth in unstructured data each year, coupled with cloud adoption and IoT devices, it is critical that organizations begin to pi...

See Details

Optiv Empowers Global Consulting Firm to Expedite Data Processing Speed and Gain Customer Insight

A leading management consulting firm needed to create a unified platform in the cloud to increase performance at scale.

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.