A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 577 - 588 of 786 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog ATT&CK’s Initial Access Adversarial Tactic October 05, 2018 By far the best way to prevent a security incident is to prevent the initial access from being obtained in the first place. This is why organizations.... Read the Blog Image Blog Inside and Outside the Cardholder Data Environment October 04, 2018 Businesses have spent an enormous amount of money on PCI compliance. It is time to leverage these existing investments and expand them to include.... Read the Blog Image Blog Do You Know Where Your Evidence Is? October 03, 2018 In part three of our series focused on the Enemy Perspective, we’ll focus on an important element of incident response: digital forensics.... Read the Blog Image Blog Staying Cyber Safe During Digital Transformation October 01, 2018 It’s October and that means National Cybersecurity Awareness Month (NCSAM) is upon us. This annual initiative raises awareness about the importance of.... Read the Blog Image Blog Intro to Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™ Series) September 28, 2018 This series is focused on the risk associated with attacks which leverage vulnerabilities that could have been mitigated through the implementation of.... Read the Blog Image Blog Data is the New Currency September 26, 2018 In today’s digital world, data is currency. Nowhere does this phenomenon show itself more clearly than in the world of payment transactions. Payment.... Read the Blog Image Blog The Necessity of Enemy Perspectives: The Enemy Gets a Vote September 21, 2018 The enemy gets a vote. The current Secretary of Defense and retired Marine Corps General James Mattis is fond of this observation. However, in many.... Read the Blog Image Blog Intelligence Bulletin – India Hiring Proxy September 18, 2018 On June 4, 2018, Optiv gTIC Human Intelligence (HUMINT) cell contacted an India-based individual providing interview-proxy services for job applicants.... Read the Blog Image Blog Skills Gap – Hiring When There’s No People September 13, 2018 While part of the solution to a robust and complete security program is security automation and orchestration (SAO), do not forget that hackers are.... Read the Blog Image Blog Getting Started with Postman for API Security Testing: Part 2 September 06, 2018 Postman is a useful tool used by many developers to document, test and interact with Application Programming Interfaces (APIs). This post will explore.... Read the Blog Image Blog We Want Robots to Do (Part of) Our Job September 05, 2018 The job of an information security analyst today is rife with repetitive, sometimes mundane tasks that are performed based on the analyst’s best.... Read the Blog Image Blog Security Operations Efficiency is Not Gained Through a Patchwork of Expensive Security Tools August 28, 2018 Cloud, mobile, social media, IoT and big data have profoundly expanded the attack surface in the latest cyber super cycle, and it’s no surprise.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 45 Page 46 Page 47 Page 48 Current page 49 Page 50 Page 51 Page 52 Page 53 … Next page Next › Last page Last » Subscribe to our newsletter for cutting-edge insights Subscribe
Image Blog ATT&CK’s Initial Access Adversarial Tactic October 05, 2018 By far the best way to prevent a security incident is to prevent the initial access from being obtained in the first place. This is why organizations....
Image Blog Inside and Outside the Cardholder Data Environment October 04, 2018 Businesses have spent an enormous amount of money on PCI compliance. It is time to leverage these existing investments and expand them to include....
Image Blog Do You Know Where Your Evidence Is? October 03, 2018 In part three of our series focused on the Enemy Perspective, we’ll focus on an important element of incident response: digital forensics....
Image Blog Staying Cyber Safe During Digital Transformation October 01, 2018 It’s October and that means National Cybersecurity Awareness Month (NCSAM) is upon us. This annual initiative raises awareness about the importance of....
Image Blog Intro to Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™ Series) September 28, 2018 This series is focused on the risk associated with attacks which leverage vulnerabilities that could have been mitigated through the implementation of....
Image Blog Data is the New Currency September 26, 2018 In today’s digital world, data is currency. Nowhere does this phenomenon show itself more clearly than in the world of payment transactions. Payment....
Image Blog The Necessity of Enemy Perspectives: The Enemy Gets a Vote September 21, 2018 The enemy gets a vote. The current Secretary of Defense and retired Marine Corps General James Mattis is fond of this observation. However, in many....
Image Blog Intelligence Bulletin – India Hiring Proxy September 18, 2018 On June 4, 2018, Optiv gTIC Human Intelligence (HUMINT) cell contacted an India-based individual providing interview-proxy services for job applicants....
Image Blog Skills Gap – Hiring When There’s No People September 13, 2018 While part of the solution to a robust and complete security program is security automation and orchestration (SAO), do not forget that hackers are....
Image Blog Getting Started with Postman for API Security Testing: Part 2 September 06, 2018 Postman is a useful tool used by many developers to document, test and interact with Application Programming Interfaces (APIs). This post will explore....
Image Blog We Want Robots to Do (Part of) Our Job September 05, 2018 The job of an information security analyst today is rife with repetitive, sometimes mundane tasks that are performed based on the analyst’s best....
Image Blog Security Operations Efficiency is Not Gained Through a Patchwork of Expensive Security Tools August 28, 2018 Cloud, mobile, social media, IoT and big data have profoundly expanded the attack surface in the latest cyber super cycle, and it’s no surprise....