Skip to main content
Sort By:

Some of the top cybersecurity technology buying trends

Keeping up with and evaluating cybersecurity technologies can be a continuous and ongoing challenge for organizations. To make this effort easier, Opt...

See Details

ATT&CK Series: Collection Tactics

In this post, we will address some of the MITRE ATT&CK’s Collection techniques and tactics, from an attacker’s point of view to harvest organizational...

See Details

Privacy Programs as Foundational Security

With mounting regulations, connectivity, and an explosion in data, privacy management programs are critical components of an overall security program....

See Details

Service Providers and PCI Compliance, Part 1 – Cloud Services and Your Obligations

This post is the first in a three-part series dedicated to companies working with service providers relating to PCI compliance. Part 1 below focuses o...

See Details

Cybersecurity: Lost Your Keys?

From time to time we all lose our keys. The solution for physical keys is simple – find the spare set and head down to your local hardware store so th...

See Details

Retro Risk Appetite

Accepted risk is all too often the result of a lack of priorities around managing risk. It’s all too easy to say “We don’t want to spend $50,000 USD o...

See Details

Is your organization GDPR Compliant? Use a checklist

Most major organizations are already fully compliant with GDPR. However, some may just now be launching into European markets, and others may have fai...

See Details

22 ways to protect yourself against phishing attacks

Hackers are clever and are always innovating new ways to breach cybersecurity defenses, so no single tactic is likely to afford 100% protection. But o...

See Details

ATT&CK Series: Command and Control

In this post, we will review ATT&CK’s Command and Control techniques from an attacker’s point of view. The techniques covered here are not inclusive o...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.