Every Solution You Can Imagine – and More What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need Optiv works with more than 400 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)Cyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOpinionOptivOptiv CorporateOptivConPartnershipPhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image MobileIron MDM Contains Static Key Allowing Account Enumeration March 22, 2021 MobileIron MDM exposes account enumeration and SFA to unauthenticated attacks. This analysis details how to mitigate this vulnerability. See Details Blog Image BadOutlook for C2 March 18, 2021 Given Office product functionality, it’s possible for adversaries to leverage Outlook's COM interface in attacks for extended persistence. See Details Blog Image Where CASB and SWG Are Headed March 16, 2021 Recent cloud access security brokers and secure web gateways reports suggest we’re rapidly moving toward a secure access service edge future. See Details Blog Image Microsoft Exchange “Hafnium” Hack: Recommended Steps March 10, 2021 Take these immediate steps to protect your data against the recent Microsoft Exchange Server hack. See Details Blog Image SUNBURST, Supply Chain Attacks and How to Detect Them February 26, 2021 Sri Sundaralingam of ExtraHop identifies some common supply chain hack elements and explains how to discover and stop them in the early stages. See Details Blog Image Cybersecurity Helps Me Protect Family, Friends and Myself February 19, 2021 Senior Marketing Product Manager Greg L says working in cybersecurity means protecting your family, your friends and your community. See Details Blog Image Cybersecurity Risk Assessment Tiering February 18, 2021 Risk assessments must consider people, process and technology. A three-tiered approach reduces risk and exposure. See Details Blog Image Automating Captcha Attacks February 17, 2021 Captcha images don’t provide robust protection as a primary security control. This analysis explores how to prevent automated (bot) attacks. See Details Blog Image Attempted Florida Water Supply Tampering Underscores IoT/OT Security Challenges February 10, 2021 Concerned about the recent Florida water system hack? We can help assess and secure your IoT and OT infrastructure. See Details Blog Image Critical Areas in Evaluating Third-Party Risks February 04, 2021 This post addresses key areas organizations should evaluate when reviewing or building out third-party risk management programs. See Details Blog Image EDR and Blending In: How Attackers Avoid Getting Caught February 03, 2021 Even when the hooks are removed, defenders can still leverage other EDR functions, such as host isolation for incident triage or remote. See Details Blog Image Endpoint Detection and Response: How Hackers Have Evolved February 02, 2021 This post identifies systemic endpoint detection and response issues and examines how attackers can bypass any EDR product. See Details Blog Pagination First page « First Previous page ‹ Previous … Page 4 Page 5 Page 6 Page 7 Current page 8 Page 9 Page 10 Page 11 Page 12 … Next page Next › Last page Last »
Image MobileIron MDM Contains Static Key Allowing Account Enumeration March 22, 2021 MobileIron MDM exposes account enumeration and SFA to unauthenticated attacks. This analysis details how to mitigate this vulnerability. See Details Blog
Image BadOutlook for C2 March 18, 2021 Given Office product functionality, it’s possible for adversaries to leverage Outlook's COM interface in attacks for extended persistence. See Details Blog
Image Where CASB and SWG Are Headed March 16, 2021 Recent cloud access security brokers and secure web gateways reports suggest we’re rapidly moving toward a secure access service edge future. See Details Blog
Image Microsoft Exchange “Hafnium” Hack: Recommended Steps March 10, 2021 Take these immediate steps to protect your data against the recent Microsoft Exchange Server hack. See Details Blog
Image SUNBURST, Supply Chain Attacks and How to Detect Them February 26, 2021 Sri Sundaralingam of ExtraHop identifies some common supply chain hack elements and explains how to discover and stop them in the early stages. See Details Blog
Image Cybersecurity Helps Me Protect Family, Friends and Myself February 19, 2021 Senior Marketing Product Manager Greg L says working in cybersecurity means protecting your family, your friends and your community. See Details Blog
Image Cybersecurity Risk Assessment Tiering February 18, 2021 Risk assessments must consider people, process and technology. A three-tiered approach reduces risk and exposure. See Details Blog
Image Automating Captcha Attacks February 17, 2021 Captcha images don’t provide robust protection as a primary security control. This analysis explores how to prevent automated (bot) attacks. See Details Blog
Image Attempted Florida Water Supply Tampering Underscores IoT/OT Security Challenges February 10, 2021 Concerned about the recent Florida water system hack? We can help assess and secure your IoT and OT infrastructure. See Details Blog
Image Critical Areas in Evaluating Third-Party Risks February 04, 2021 This post addresses key areas organizations should evaluate when reviewing or building out third-party risk management programs. See Details Blog
Image EDR and Blending In: How Attackers Avoid Getting Caught February 03, 2021 Even when the hooks are removed, defenders can still leverage other EDR functions, such as host isolation for incident triage or remote. See Details Blog
Image Endpoint Detection and Response: How Hackers Have Evolved February 02, 2021 This post identifies systemic endpoint detection and response issues and examines how attackers can bypass any EDR product. See Details Blog