Skip to main content
Main Menu 2
    • Solutions For
      • Advanced Detection & Response
      • Application Security & Threat
      • Data Protection
      • Identity Modernization
      • Remediation
      • Resiliency
      • Risk & Privacy
      • Securing Digital Transformation
      • Zero Trust
    • Industry
      • Canada Operations
      • Optiv Federal
    • Every Solution You Can Imagine – and More

       

      What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.

    • View All Solutions
    • Strategy
      • CMMC
      • Cyber Education
      • Cyber Fraud Strategy (Kill-Chain)
      • Cyber Recovery (CRS)
      • Cyber Strategy & Roadmap
      • Digital Transformation
      • Enterprise Resilience
      • Mergers & Acquisitions
      • Security Maturity
      • Security Operations
    • Infrastructure
      • Cloud Security
      • Endpoint Security
      • IOT
      • Network Security
      • Operational Technology
      • Physical Security
    • Identity
      • Digital Access Management
      • Identity Advisory Services (Identity Services)
      • Identity Governance & Administration
      • Privileged Access Management
    • Technology Services
      • Authorized Support Program
      • NSAR
      • OTAV (Bake off)
      • SIEM Services
      • Technology Management
      • Technology Rationalization
    • Application Security
      • AppSec Assessment
      • AppSec Program Security
      • AppSec Technology Services
    • Managed Services
      • Co-Managed SIEM
      • Fusion Center/Next Gen SOC
      • Managed XDR (MXDR)
      • PAM as-a-Service
      • Security Monitoring
      • Vulnerability Management
    • Threat
      • Attack & Penetration Testing
      • Attacker Simulation/Red & Purple Team
      • Incident Readiness
      • Incident Response
      • Ransomware
      • Remediation Services
      • Threat Intelligence
    • Risk
      • Compliance
      • Insider Risk Management
      • PCI DSS Compliance
      • Program Development
      • Risk Automation & Reporting
      • Third-Party Risk Management
    • Data Governance Privacy & Protection
      • Data Governance
      • Data Privacy
      • Data Protection
    • Transformation Services
      • Big Data, Analytics & Artificial Intelligence
      • Cloud Migration & Strategy
      • Connected Devices
      • Data Architecture Transformation (Data Fabric)
      • Orchestration & Automation
      • Software Development
    • View All Services
    • Technology Partners
      • Find a Partner
    • A Single Partner for Everything You Need

       

      Optiv works with more than 400 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.

    • Discover
      • Blog
      • CISO Periodic Table
      • Cybersecurity Dictionary
      • Downloads
      • Field Guides
      • Videos
    • Source Zero
      • Blog
      • Tools
      • Videos
    • Image
      field-guide-10-hero-list-image
      Cybersecurity Field Guide #10.0: Forging Operational Resilience
      To survive and thrive in the complex digital future, enterprises must build cybersecurity resilience. This guide offers in-depth approaches.
      Download Now
      Image
      SZ_Breached_476x210_Red
      Spear Phishing on Modern Platforms
      Spear phishing is a social engineering activity intended to simulate a realistic attack scenario with the intent of bypassing technical security controls and persuading employees to perform various actions.
      Learn more
      Image
      future-trends-list-image
      A Visual Future of Cybersecurity
      This ebook looks at technologies and innovations that will affect cybersecurity in the coming years, including AI, quantum computing and IoT.
      Download Now
    • Information
      • About Us
      • Careers
      • Events
      • Leadership
      • Locations
    • In the News
      • Optiv Newsroom
      • Optiv Chips In
    • We Are Optiv

       

      Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.

       

      However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.

  • Contact
  • Contact Us

Optiv Blog

Image
Optiv_SourceZero_Evolution-of-Cloud-Forensics-Custom-Image_476x210

The Evolution of Cloud Forensics and Incident Response

February 01, 2021

Toolsets have evolved for high-fidelity forensics and investigations – here we map them to the MITRE ATT&CK framework for Enterprise Cloud.

See Details

Blog

Image
interview-wrozek-476px

Privacy vs Employee Monitoring and Internal Investigations

January 25, 2021

Data privacy typically relates to what corporations do with consumer data, but it’s also important to consider workplace privacy.

See Details

Blog

Image
Ideology-based Threats in Response to Civil Unrest_List-Section-Thumbail-Image_476x210

Ideology-based Threats in Response to Civil Unrest

January 13, 2021

Organizations need to coordinate and prepare for any potential attack, whether digital or physical, relating to last week’s U.S. Capitol violence.

See Details

Blog

Image
partner-imperva-ecommerce-476px

Black Friday, Cybersecurity, COVID: Ecommerce is Under Attack

December 15, 2020

An integrated application security platform will help retailers operate efficiently and securely throughout the holidays and beyond.

See Details

Blog

Image
IOTOT_9_list_476x210

Abusing AirWatch MDM Services to Bypass MFA

December 11, 2020

Our team describes how single-factor authentication attack surfaces can be exposed in the AirWatch MDM suite and what steps to take to mitigate risks.

See Details

Blog

Image
partner-extra-hop-#3-476px

Your 2021 Security Strategy: NDR or XDR?

December 09, 2020

By working with cloud providers to open up packets to security vendors, network detection/response enables comprehensive visibility in the cloud.

See Details

Blog

Image
key-principles-in-building-operational-476px_v2

Key Principles in Building Operational Resilience

December 02, 2020

This post articulates the five key principles for building operational resilience across the organization.

See Details

Blog

Image
thoughtleadership1-476px

Thought Leadership and Science Fiction

November 19, 2020

When your world is so technically advanced it might as well be science fiction, thought leadership always has to be looking around the next corner.

See Details

Blog

Image
risk_NIST-blog-476px

NIST SP 800-53 Rev 5: Understanding, Preparing for Change

November 18, 2020

NIST’s Special Publication 800-53 Revision 5 provides guidance on the next generation of the security and privacy controls framework.

See Details

Blog

Image
partner-extrahop-476px

Insecure API Cloud Computing: The Causes and Solutions

November 16, 2020

While cloud APIs can streamline processes, they can also invite in new security risks. ExtraHop’s Matt Cauthorn offers best practices to stay secure.

See Details

Blog

Image
negative_threat_modelzero_trus_red_3_list

Certificate Validation Disabled in Black Duck API Wrapper

November 05, 2020

A security vulnerability has been found in the Black Duck Hub REST API Python project (“blackduck” in the PyPI repository). Read more.

See Details

Blog

Image
OptivFoundry_Blog-List_476x210_5

Copying Updated WinAutomation Databases for RPA With Azure Custom Script Extensions

November 04, 2020

How to copy updated WinAutomation databases for RPA with Azure custom script extensions – part five of a series.

See Details

Blog

Pagination

  • First page « First
  • Previous page ‹ Previous
  • …
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Current page 9
  • Page 10
  • Page 11
  • Page 12
  • Page 13
  • …
  • Next page Next ›
  • Last page Last »
Footer
  • Solutions
  • Services
  • Partners
  • Insights
  • About Us
  • Careers

 

 

Secure greatness™

 

Home | Contact | Cookie Policy | Privacy Policy | Terms of Use | Compliance | Sitemap

 

The content provided is for informational purposes only. Links to third party sites are provided for your convenience and do not constitute an endorsement. These sites may not have the same privacy, security or accessibility standards.

 

© 2020 – 2022. Optiv Security Inc. All Rights Reserved.