Skip to main content
Sort By:

Risk-Based Vulnerability Management Changes the Game

Risk-Based Vulnerability Management reduces risk more efficiently and meaningfully than legacy vulnerability management programs.

See Details

Thanks to COVID-19, Remote Work is Here to Stay

Recent research from Gartner and others indicates the COVID Work From Home spike is here to stay.

See Details

Rough Thoughts on Mobile/Digital Voting

In this guest post, Imperva’s Kunal Anand the challenges facing digital voting.

See Details

Azure Native and Third-Party Tools: New White Paper

This paper helps you understand cloud infrastructure assessment tools provided with Microsoft Azure and other third parties.

See Details

Security and COVID: Moving Past Duct Tape and Baling Twine

As COVID operations settle down it’s time to reestablish a strategic cybersecurity mindset.

See Details

Executive Order: White House takes on Utility Hackers…

Managing an OT security program that meets C-Suite budgets and White House expectations is difficult but possible.

See Details

Energy Sector Critical Infrastructure: The Enemy Perspective

This article discusses how threat actors attack critical energy infrastructure and how they achieve success.

See Details

Coronavirus: Back-to-Basics Threats, Back-to-Basics Security

The need to secure remote workers is a permanent part of the landscape.

See Details

ATT&CK Series: Collection Tactics – Part Two

The NIST Privacy Framework formalizes what risk and privacy professionals already know should be done.

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.