Skip to main content
Sort By:

AWS Native and Third-Party Tools: New White Paper

This white paper details the cloud infrastructure assessment tools provided by AWS, Palo Alto Networks and Tenable.

See Details

Building a Holistic Privacy Management Program

Rather than building programs for individual jurisdictions, organizations should develop holistic programs that address the overarching commonalities.

See Details

Risk Transformation: Bridging Assessment and Execution

With risk transformation, it can be difficult to bridge the gap between assessment and implementation.

See Details

This is Not a Drill: Phishing-as-a-Service

1.5 million new phishing sites launch every month thanks to the advent of Phishing-as-a-Service offerings.

See Details

Cyber Threats, Unintegrated Tools and Alert Fatigue

Nearly a third of cybersecurity professionals say they ignore alerts because so many are false positives.

See Details

Nemty Ransomware Deployed via Payment Service Phish

In late August, a new ransomware strain, Nemty, was distributed in the wild. It, coupled with a multitude of other ransomware threats in 2019, demands...

See Details

How to Get Into Cybersecurity, Even Without a Technical Background

Many traditional and non-traditional education and training programs can help prepare you for a career in cybersecurity.

See Details

Six Reasons to Consider a Career in Cybersecurity

One of the most promising career fields is the booming cybersecurity industry.

See Details

Cybersecurity Awareness and the Bystander Effect

The K12 sector sees a large number of cybersecurity incidents each year, including unauthorized disclosure of data by staff, students and vendors as w...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.