Skip to main content
Sort By:

#AskOptiv: Defending Against AI Weaponized Threats

How cybersecurity organizations position and defend themselves with respect to AI will separate survivors from victims.

See Details

Orchestrator Risks

The health and security of the orchestration technology cluster is critically important and should not be understated.

See Details

Registry Risks

Part 4 in the Gaining Visibility into NIST SP 800-190 series explores Registry Risks and Registry Countermeasures.

See Details

Image Risks

Part Three of our series explores what native AWS tools and third-party solutions are available to address the risks identified in the NIST SP 800-190...

See Details

Extending the Hybrid Cloud Lab

Part 2 in the Gaining Visibility into NIST SP 800-190 series is designed for security practitioners and others starting down the path of understanding...

See Details

Optiv ThreatDNA Platform and ThreatBEAT Service

The need for intelligence-driven operations resulted in Optiv’s Global Threat Intelligence Center (gTIC). In 2020, our intelligence operations will in...

See Details

The Top Six Cybersecurity Trends for 2020

From Brand to eCommerce to mobile services and payments to salesforce enablement and remote work to BYOD to online banking and beyond, cybersecurity i...

See Details

Measuring Cybersecurity ROI Part 3: Innovation, Revenue Opportunities

From Brand to eCommerce to mobile services and payments to salesforce enablement and remote work to BYOD to online banking and beyond, cybersecurity i...

See Details

Forrester IAM Managed Services Overview Helps CISOs Find the Right Solution

Forrester’s “Now Tech: Managed IAM Services, Q4 2019” report illustrates that the need for a successful IAM program is gaining momentum as a central c...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.