A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image In Business, the First Casualty of Innovation Is Security August 13, 2021 Few organizations know how to secure cloud data. Visibility, discovery and classification drives costs down while improving the customer experience. See Details Blog Image Automated Endpoint Evaluations – Part 1 August 12, 2021 Optiv researcher Dan Kiraly examines automated endpoint evaluations in the first technical video of a series. See Details Blog Image PetitPotam & Active Directory Certificate Services August 10, 2021 Multiple CVEs involving Active Directory Certificate Services and a new NTLM relay attack can be chained to compromise an Active Directory domain. See Details Blog Image Governing Identities in a Hybrid, Multi-Cloud Environment July 13, 2021 This post explains how identity is central to a secure cloud access governance program. See Details Blog Image Zero Trust is About Changing Security Mentality July 08, 2021 Zero Trust safeguards assets and data in the cloud, but organizations should also invest in building a Zero Trust culture. See Details Blog Image What Does the Cybersecurity Executive Order Mean for You? June 29, 2021 The executive order on cybersecurity emphasizes coordinated, mandated levels of controls to respond to a growing threat to critical infrastructure. See Details Blog Image Go365: Office 365 Password Spraying Tool June 17, 2021 Go365 performs user enumeration and password spraying attacks on organizations that use Office 365. See Details Blog Image Combating Ransomware – Protecting a Nation’s Critical Infrastructure June 17, 2021 Recent high-profile cyber attacks, including the Colonial Pipeline ransomware and SolarWinds supply chain hacks, led to the White House executive.... See Details Blog Image Kubernetes Attack Surface June 17, 2021 Optiv highlights the attack strategy of using forged Kerberos tickets to compromise a domain, and provides ways to defend against it. See Details Blog Image Kerberos - A Domains Achille's Heel June 02, 2021 Optiv highlights the attack strategy of using forged Kerberos tickets to compromise a domain, and provides ways to defend against it. See Details Blog Image Introducing an Automated Approach to Risk Management May 26, 2021 The constant churn of audit and compliance testing drives the need for an automated risk management approach. See Details Blog Image Three Ways to Drive Networking-Security Team Collaboration May 24, 2021 In this guest post, CyberGRX examines cyber attack vectors and offers advice on securing third-party relationships. See Details Blog Pagination First page « First Previous page ‹ Previous … Page 18 Page 19 Page 20 Page 21 Current page 22 Page 23 Page 24 Page 25 Page 26 … Next page Next › Last page Last »
Image In Business, the First Casualty of Innovation Is Security August 13, 2021 Few organizations know how to secure cloud data. Visibility, discovery and classification drives costs down while improving the customer experience. See Details Blog
Image Automated Endpoint Evaluations – Part 1 August 12, 2021 Optiv researcher Dan Kiraly examines automated endpoint evaluations in the first technical video of a series. See Details Blog
Image PetitPotam & Active Directory Certificate Services August 10, 2021 Multiple CVEs involving Active Directory Certificate Services and a new NTLM relay attack can be chained to compromise an Active Directory domain. See Details Blog
Image Governing Identities in a Hybrid, Multi-Cloud Environment July 13, 2021 This post explains how identity is central to a secure cloud access governance program. See Details Blog
Image Zero Trust is About Changing Security Mentality July 08, 2021 Zero Trust safeguards assets and data in the cloud, but organizations should also invest in building a Zero Trust culture. See Details Blog
Image What Does the Cybersecurity Executive Order Mean for You? June 29, 2021 The executive order on cybersecurity emphasizes coordinated, mandated levels of controls to respond to a growing threat to critical infrastructure. See Details Blog
Image Go365: Office 365 Password Spraying Tool June 17, 2021 Go365 performs user enumeration and password spraying attacks on organizations that use Office 365. See Details Blog
Image Combating Ransomware – Protecting a Nation’s Critical Infrastructure June 17, 2021 Recent high-profile cyber attacks, including the Colonial Pipeline ransomware and SolarWinds supply chain hacks, led to the White House executive.... See Details Blog
Image Kubernetes Attack Surface June 17, 2021 Optiv highlights the attack strategy of using forged Kerberos tickets to compromise a domain, and provides ways to defend against it. See Details Blog
Image Kerberos - A Domains Achille's Heel June 02, 2021 Optiv highlights the attack strategy of using forged Kerberos tickets to compromise a domain, and provides ways to defend against it. See Details Blog
Image Introducing an Automated Approach to Risk Management May 26, 2021 The constant churn of audit and compliance testing drives the need for an automated risk management approach. See Details Blog
Image Three Ways to Drive Networking-Security Team Collaboration May 24, 2021 In this guest post, CyberGRX examines cyber attack vectors and offers advice on securing third-party relationships. See Details Blog