Skip to main content
Sort By:

Tales from Trenches: Cybersecurity Tool Depth and Features

Things we use every day may have useful, but undiscovered features. It’s the same with cybersecurity. Something you already have (appliances, software...

See Details

The Business-Centric Risk Strategy

Many organizations are reaching a breaking point when it comes to the effectiveness of their cybersecurity. Security teams are overwhelmed with the jo...

See Details

ATT&CK Series: Discovery

Modern information technology has rocketed the business sector to impressive heights, as innovative devices and software solutions are implemented eve...

See Details

Artificial Intelligence and Cybersecurity

The mention of Artificial Intelligence (AI) brings up different associations for people. Some recall Hal 2001: A Space Odyssey and others may point to...

See Details

How Can You Determine the Risk of a Threat Actor?

One of the primary goals of an intelligence team is to prioritize the threats that face an organization. This includes how a particular threat actor o...

See Details

Learning the Enemy Perspective

Make offensive security games, and regular penetration testing part of your ongoing threat management program and your team will gain knowledge to be ...

See Details

Features of a Threat Intelligence Platform

A Threat Intelligence Platform (TIP) is a fantastic way to manage intelligence and its process amongst individual teams and communities, including cli...

See Details

Security in 2019: Getting Ahead of the Game

The year 2018 was not much different than recent years in the world of security: Several massive security incidents at large companies and government ...

See Details

It’s Not Always About the Perimeter – A Look at Domain Reconnaissance

In this information age, security threats are commonplace and can be devastating to a business. The ability to quickly and accurately detect cyber-thr...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.