A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 1 - 12 of 810 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Unlocking Identity: How to Scale IAM for Modern Complexity March 18, 2026 Learn about three common reasons identity programs stall and how organizations can finally break through. Read the Blog Image Blog NHI 101: What Is a Non-Human Identity? March 17, 2026 NHI’s don’t behave like people, and that’s risky. Explore the rise of non-human identities in modern organizations and why securing them is crucial. Read the Blog Image Blog Cloud-Native DSPM at Cloud Speed March 17, 2026 Cloud-native DSPM must deliver fast deployment and measurable outcomes. Learn why SaaS delivery and automated remediation are critical to reducing.... Read the Blog Image Blog Continuous Threat Exposure Management Explained March 16, 2026 What is CTEM? Learn how Continuous Threat Exposure Management improves vulnerability management by prioritizing exploitable threats and reducing cyber.... Read the Blog Image Blog You Can’t Adopt DSPM Without Governance March 02, 2026 Unlock the full power of DSPM. Discover why strong data governance is essential for actionable insights and lasting data security. Read the Blog Image Blog A Silent Saboteur at the Grid’s Edge: Decoding Supraharmonics February 19, 2026 Learn how coordinated smart inverters can bypass grid protections and cause physical infrastructure damage through supraharmonic cyber‑physical.... Read the Blog Image Blog 47 Days, Zero Panic: How CISOs Can Thrive in the New TLS Reality February 12, 2026 See how CISOs can manage rapid TLS certificate renewal cycles with automation, ensuring compliance and confidence in a 47-day reality. Read the Blog Image Blog Securing SIM-Connected IoT and OT Devices with Zscaler February 05, 2026 Discover how Zscaler extends Zero Trust to SIM‑connected IoT and OT devices, enabling identity‑based security, visibility and policy control beyond Wi.... Read the Blog Image Blog The Hidden Threat: Why Insider Risk Management Is the New Frontier of Cyber Defense January 27, 2026 Learn how to future-proof your cyber defense with insider risk strategies for 2026 and beyond. Read the Blog Image Blog Data Privacy: Preventing Accidental and Malicious Data Leaks January 13, 2026 Discover expert strategies to prevent accidental and malicious data leaks, empower your team and build a resilient privacy culture during Data Privacy.... Read the Blog Image Blog Where Commitment Meets Impact: 2025 Optiv Chips In Year in Review January 10, 2026 Together, we are building a legacy of generosity, innovation and hope, one that will empower generations to come. Read the Blog Image Blog Defend Against Cyber Threats for FIFA World Cup 2026 December 23, 2025 Learn key strategies to protect your organization during the FIFA World Cup 2026. Stay ahead of cyber threats with expert insights. Read the Blog Pagination Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 … Next page Next › Last page Last » Subscribe to our newsletter for cutting-edge insights Subscribe
Image Blog Unlocking Identity: How to Scale IAM for Modern Complexity March 18, 2026 Learn about three common reasons identity programs stall and how organizations can finally break through.
Image Blog NHI 101: What Is a Non-Human Identity? March 17, 2026 NHI’s don’t behave like people, and that’s risky. Explore the rise of non-human identities in modern organizations and why securing them is crucial.
Image Blog Cloud-Native DSPM at Cloud Speed March 17, 2026 Cloud-native DSPM must deliver fast deployment and measurable outcomes. Learn why SaaS delivery and automated remediation are critical to reducing....
Image Blog Continuous Threat Exposure Management Explained March 16, 2026 What is CTEM? Learn how Continuous Threat Exposure Management improves vulnerability management by prioritizing exploitable threats and reducing cyber....
Image Blog You Can’t Adopt DSPM Without Governance March 02, 2026 Unlock the full power of DSPM. Discover why strong data governance is essential for actionable insights and lasting data security.
Image Blog A Silent Saboteur at the Grid’s Edge: Decoding Supraharmonics February 19, 2026 Learn how coordinated smart inverters can bypass grid protections and cause physical infrastructure damage through supraharmonic cyber‑physical....
Image Blog 47 Days, Zero Panic: How CISOs Can Thrive in the New TLS Reality February 12, 2026 See how CISOs can manage rapid TLS certificate renewal cycles with automation, ensuring compliance and confidence in a 47-day reality.
Image Blog Securing SIM-Connected IoT and OT Devices with Zscaler February 05, 2026 Discover how Zscaler extends Zero Trust to SIM‑connected IoT and OT devices, enabling identity‑based security, visibility and policy control beyond Wi....
Image Blog The Hidden Threat: Why Insider Risk Management Is the New Frontier of Cyber Defense January 27, 2026 Learn how to future-proof your cyber defense with insider risk strategies for 2026 and beyond.
Image Blog Data Privacy: Preventing Accidental and Malicious Data Leaks January 13, 2026 Discover expert strategies to prevent accidental and malicious data leaks, empower your team and build a resilient privacy culture during Data Privacy....
Image Blog Where Commitment Meets Impact: 2025 Optiv Chips In Year in Review January 10, 2026 Together, we are building a legacy of generosity, innovation and hope, one that will empower generations to come.
Image Blog Defend Against Cyber Threats for FIFA World Cup 2026 December 23, 2025 Learn key strategies to protect your organization during the FIFA World Cup 2026. Stay ahead of cyber threats with expert insights.