Skip to main content
Sort By:

MythBusters: Debunking Five Common Identity and Data Management Myths

Debunking common myths about IDM. Examples: too expensive and complex; current IT teams can't support IDM evolution; custom is better; company data/IP...

See Details

That Time I Clicked on a Phish

Even the savviest of us can “fall for” a phishing email. Here are a few things to look for to help spot them quicker.

See Details

Indecent Proposal? When Identity, Privacy and Ethics Collide

Users expect data privacy – and regulations require it. Yet, security measures require full visibility into all data in the business ecosystem. This b...

See Details

Network Trust: How to Maintain and Establish it in Your Perimeter

Everyone has heard about “the expanding attack surface” and the “ever-increasing amounts of data;” about employees wanting to access email on their ow...

See Details

Why Identity Matters in a Strategic Identity and Data Management Programme

Keeping identity centre stage in your security strategy will help prevent breaches and the misuse of personal data. Taking a strategic approach is imp...

See Details

ATT&CK Series: Persistence

In this post, we will cover ATT&CK’s Persistence techniques and tactics that an attacker may employ to maintain their presence following initial compr...

See Details

Future-Proofing your Business with Identity-Centric Security

Creating and executing a truly identity-centric security strategy is more subjective than just “block” or “allow.” It takes a nuanced, subtle, proacti...

See Details

Conversations with the Board

Building and maintaining a world-class cybersecurity program is about partnering with the people who have the most influence, C-suite executives and b...

See Details

Machine Learning: Make Cybersecurity a Priority

Organizations are investing billions in ML to try and analyze data better and improve things like decision-making or customer satisfaction. However, M...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.