Skip to main content
Sort By:

Navigating Your "New Normal": Help from a WFH Veteran

A WFH veteran offers tips on maximizing productivity while promoting physical and emotional well-being.

See Details

COVID-19: Securing Work From Home

CISOs must consider COVID ramifications on a larger scale and not lose sight of their organizational roadmap.

See Details

COVID-19: Charting the Cybersecurity Implications of a Pandemic

This series will deliver COVID crisis cybersecurity strategies, best practices and advice.

See Details

Container Compromise to IaaS Recon

Is a container breakout to access the Kubernetes node possible? How might it work?

See Details

Host OS Risks

Here we explore the NIST SP 800-190 Application Container Security Guide: Host OS Risks and Countermeasures.

See Details

The Dynamic Opportunistic Attacker Landscape

Rapid7's @hrbrmstr takes a look at critical vulnerabilities and discusses how defenders should manage them.

See Details

Games Without Frontiers: Cybersecurity and Artificial Intelligence

Game-playing AIs have invented tactics nobody has seen before. This could be good news for cybersecurity professionals.

See Details

NIST Privacy Framework a Flexible Tool for Managing Privacy Risks

NIST’s Privacy through Enterprise Risk Management helps organizations improve privacy practices.

See Details

Container Risks

Container technologies allow developers to assemble code and associated dependencies into a single package or container image.

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.