Skip to main content
Sort By:

Future-Proof Your Digital Business with Zero Trust Security

The increasingly popular Zero Trust information security model maintains strict access controls by not trusting anyone or any action by default – and ...

See Details

The Danger of Assumptions

Typically, CISOs are more comfortable discussing “speeds and feeds” than profits and losses. For many directors it’s the exact opposite. For both, the...

See Details

AWS Native and Third-Party Tools: New White Paper

This white paper details the cloud infrastructure assessment tools provided by AWS, Palo Alto Networks and Tenable.

See Details

Building a Holistic Privacy Management Program

Rather than building programs for individual jurisdictions, organizations should develop holistic programs that address the overarching commonalities.

See Details

Risk Transformation: Bridging Assessment and Execution

With risk transformation, it can be difficult to bridge the gap between assessment and implementation.

See Details

This is Not a Drill: Phishing-as-a-Service

1.5 million new phishing sites launch every month thanks to the advent of Phishing-as-a-Service offerings.

See Details

Cyber Threats, Unintegrated Tools and Alert Fatigue

Nearly a third of cybersecurity professionals say they ignore alerts because so many are false positives.

See Details

Nemty Ransomware Deployed via Payment Service Phish

In late August, a new ransomware strain, Nemty, was distributed in the wild. It, coupled with a multitude of other ransomware threats in 2019, demands...

See Details

How to Get Into Cybersecurity, Even Without a Technical Background

Many traditional and non-traditional education and training programs can help prepare you for a career in cybersecurity.

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.