A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 361 - 372 of 789 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Cloud is Resetting Cybersecurity Demands April 15, 2021 Security is often threatened by rapid transformation. This analysis offers advice to businesses migrating their operations and data to the cloud. Read the Blog Image Blog Improving the Digital Identity Act of 2020 April 13, 2021 HR 8215 would establish a federal ID system. This program can be beneficial, but we need to understand its scope, complexities and nuances. Read the Blog Image Blog Accelerating Vulnerability Remediation with Automation April 12, 2021 We reduced mean time to remediate by accelerating the processes from vulnerability discovery to the deployment of a corrective system update. Read the Blog Image Blog Adopt and Adapt: How to Get Authentication Right April 08, 2021 Authentication factors like biometrics, WebAuthn/FIDO2.0 and mobile apps with push notifications provide the best security defense. Read the Blog Image Blog Talking to the Board About Cybersecurity’s New Realities April 06, 2021 Getting approval for cybersecurity priorities is tougher than ever. Here’s some advice on talking to the board about the new IT security realities. Read the Blog Image Blog Policies and Standards and Procedures – Oh My! March 31, 2021 This post provides analysis and insight into building an effective policy structure for your organization. Read the Blog Image Blog Firefox Addons For Application Security Testing March 24, 2021 Firefox’s appsec add-ons make it a useful tool for new pen testers who can’t afford professional tools. Read the Blog Image Blog MobileIron MDM Contains Static Key Allowing Account Enumeration March 22, 2021 MobileIron MDM exposes account enumeration and SFA to unauthenticated attacks. This analysis details how to mitigate this vulnerability. Read the Blog Image Blog BadOutlook for C2 March 18, 2021 Given Office product functionality, it’s possible for adversaries to leverage Outlook's COM interface in attacks for extended persistence. Read the Blog Image Blog Where CASB and SWG Are Headed March 16, 2021 Recent cloud access security brokers and secure web gateways reports suggest we’re rapidly moving toward a secure access service edge future. Read the Blog Image Blog Microsoft Exchange “Hafnium” Hack: Recommended Steps March 10, 2021 Take these immediate steps to protect your data against the recent Microsoft Exchange Server hack. Read the Blog Image Blog SUNBURST, Supply Chain Attacks and How to Detect Them February 26, 2021 Sri Sundaralingam of ExtraHop identifies some common supply chain hack elements and explains how to discover and stop them in the early stages. Read the Blog Pagination First page « First Previous page ‹ Previous … Page 27 Page 28 Page 29 Page 30 Current page 31 Page 32 Page 33 Page 34 Page 35 … Next page Next › Last page Last » Subscribe to our newsletter for cutting-edge insights Subscribe
Image Blog Cloud is Resetting Cybersecurity Demands April 15, 2021 Security is often threatened by rapid transformation. This analysis offers advice to businesses migrating their operations and data to the cloud.
Image Blog Improving the Digital Identity Act of 2020 April 13, 2021 HR 8215 would establish a federal ID system. This program can be beneficial, but we need to understand its scope, complexities and nuances.
Image Blog Accelerating Vulnerability Remediation with Automation April 12, 2021 We reduced mean time to remediate by accelerating the processes from vulnerability discovery to the deployment of a corrective system update.
Image Blog Adopt and Adapt: How to Get Authentication Right April 08, 2021 Authentication factors like biometrics, WebAuthn/FIDO2.0 and mobile apps with push notifications provide the best security defense.
Image Blog Talking to the Board About Cybersecurity’s New Realities April 06, 2021 Getting approval for cybersecurity priorities is tougher than ever. Here’s some advice on talking to the board about the new IT security realities.
Image Blog Policies and Standards and Procedures – Oh My! March 31, 2021 This post provides analysis and insight into building an effective policy structure for your organization.
Image Blog Firefox Addons For Application Security Testing March 24, 2021 Firefox’s appsec add-ons make it a useful tool for new pen testers who can’t afford professional tools.
Image Blog MobileIron MDM Contains Static Key Allowing Account Enumeration March 22, 2021 MobileIron MDM exposes account enumeration and SFA to unauthenticated attacks. This analysis details how to mitigate this vulnerability.
Image Blog BadOutlook for C2 March 18, 2021 Given Office product functionality, it’s possible for adversaries to leverage Outlook's COM interface in attacks for extended persistence.
Image Blog Where CASB and SWG Are Headed March 16, 2021 Recent cloud access security brokers and secure web gateways reports suggest we’re rapidly moving toward a secure access service edge future.
Image Blog Microsoft Exchange “Hafnium” Hack: Recommended Steps March 10, 2021 Take these immediate steps to protect your data against the recent Microsoft Exchange Server hack.
Image Blog SUNBURST, Supply Chain Attacks and How to Detect Them February 26, 2021 Sri Sundaralingam of ExtraHop identifies some common supply chain hack elements and explains how to discover and stop them in the early stages.