Skip to main content
Sort By:

Operationalizing a Cyber Threat Intelligence Solution

Cyber threat intelligence is a process required to make action-oriented, judgement-based decisions that are not otherwise possible. Optiv recommends c...

See Details

Optiv's Third-Party Risk Management Solution

How do you keep up with managing the risks posed to your business by third-party vendors? Optiv Evantix can help manage your third-party risk manageme...

See Details

Threat Hunting and Incident Response

Proactively examine your organization’s IT infrastructure with a focus on identifying signs of a potential compromise, active breach activity or malic...

See Details

Applied Research

We work with you as your adjunct product and service security arm and an extension of your design and development team.

See Details

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 17

For all functional roles in the organization prioritizing those mission critical to the business and its security, identify the specific knowledge, sk...

See Details

Optiv Security’s Top 12 Tips for More Secure Business Practices During the 2016 Holiday Season

Denver – December 8, 2016 – Optiv Security, a market-leading provider of end-to-end cyber security solutions, today shared a list of a dozen tips for ...

See Details

The JTAG Interface: An Attacker's Perspective

Manufacturers commonly equip embedded and “IoT” devices with JTAG, a powerful hardware testing interface that attackers leverage for reverse-engineeri...

See Details

PCI Executive Workshop

Optiv’s PCI Executive Workshop delivers guidance around the PCI standard and how it relates to your business.

See Details

Incident Response Readiness

Optiv’s on-site Incident Response and Readiness Assessment (IRRA) Workshop helps ensure that your incident response capability is measured against tod...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cyber security Events in your area.