A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 133 - 144 of 780 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Vertical Target Series: Industrials and Industrial Sub-Verticals November 03, 2023 Ransomware operators and APT groups often target organizations in the industrials vertical. Learn why in our blog. Read the Blog Image Blog Critical Vulnerabilities Affecting Prioritized Software and Services in September 2023 October 30, 2023 Optiv's Global Threat Intelligence Center (gTIC) rounds up the top vulnerabilities impacting prioritized software and services. Read the Blog Image Blog Fighting Cybercrime: Law Enforcement vs. Hacktivists October 20, 2023 How do law enforcement and hacktivists groups respectively approach the disruption of cybercriminal sites? Optiv highlights the key differences. Read the Blog Image Blog Secure Your Resilience October 17, 2023 Traditional business continuity and disaster recovery plans don't address cyberattacks. Learn how to shore up your cyber resilience with a proactive.... Read the Blog Image Blog Mitigating Intentional and Unintentional Risks in Software Supply Chains October 16, 2023 There’s been increasing concerns over software supply risks the last couple of years. Inadequacies of software suppliers’ capabilities to build and.... Read the Blog Image Blog Answering Key Questions About Embracing AI in Cybersecurity October 12, 2023 The demand for advanced cybersecurity solutions is becoming critical. Artificial intelligence (AI) has emerged as a powerful contender to help solve.... Read the Blog Image Blog The Benefits of a Cloud Security Network Architecture Review October 06, 2023 With the increased migration from on-premises to cloud environments, a cloud security network architecture review can help you solve key.... Read the Blog Image Blog CPPA Releases Draft Cybersecurity Regulations October 05, 2023 The California Privacy Protection Agency (CPPA) drafted regulations that may impose major cybersecurity requirements. Learn the latest. Read the Blog Image Blog Preparing for Google’s Proposed TLS Certificate Lifespan Reduction October 05, 2023 Google is reducing the TLS certificate lifespan. Prepare for this industry shift with Certificate Lifecycle Management (CLM) software. Read the Blog Image Blog Security Tool Rationalization: A Powerful Way to Elevate Security Hygiene Amid Budget Constraints October 04, 2023 Discover how to do more with less through security tool rationalization. Read the Blog Image Blog Maximizing Effectiveness: Justifying Cybersecurity Investments in a Stormy Economy October 03, 2023 Optiv subject matter experts discuss rationalizing technology to maximize effectiveness in uncertain economic times. Read the Blog Image Blog Understanding API Profiles October 03, 2023 Understanding API usage and profiles is key for an organization’s security maturity. Learn how to classify API usage, exposure, data and compliance. Read the Blog Pagination First page « First Previous page ‹ Previous … Page 8 Page 9 Page 10 Page 11 Current page 12 Page 13 Page 14 Page 15 Page 16 … Next page Next › Last page Last » Subscribe to our newsletter for cutting-edge insights Subscribe
Image Blog Vertical Target Series: Industrials and Industrial Sub-Verticals November 03, 2023 Ransomware operators and APT groups often target organizations in the industrials vertical. Learn why in our blog.
Image Blog Critical Vulnerabilities Affecting Prioritized Software and Services in September 2023 October 30, 2023 Optiv's Global Threat Intelligence Center (gTIC) rounds up the top vulnerabilities impacting prioritized software and services.
Image Blog Fighting Cybercrime: Law Enforcement vs. Hacktivists October 20, 2023 How do law enforcement and hacktivists groups respectively approach the disruption of cybercriminal sites? Optiv highlights the key differences.
Image Blog Secure Your Resilience October 17, 2023 Traditional business continuity and disaster recovery plans don't address cyberattacks. Learn how to shore up your cyber resilience with a proactive....
Image Blog Mitigating Intentional and Unintentional Risks in Software Supply Chains October 16, 2023 There’s been increasing concerns over software supply risks the last couple of years. Inadequacies of software suppliers’ capabilities to build and....
Image Blog Answering Key Questions About Embracing AI in Cybersecurity October 12, 2023 The demand for advanced cybersecurity solutions is becoming critical. Artificial intelligence (AI) has emerged as a powerful contender to help solve....
Image Blog The Benefits of a Cloud Security Network Architecture Review October 06, 2023 With the increased migration from on-premises to cloud environments, a cloud security network architecture review can help you solve key....
Image Blog CPPA Releases Draft Cybersecurity Regulations October 05, 2023 The California Privacy Protection Agency (CPPA) drafted regulations that may impose major cybersecurity requirements. Learn the latest.
Image Blog Preparing for Google’s Proposed TLS Certificate Lifespan Reduction October 05, 2023 Google is reducing the TLS certificate lifespan. Prepare for this industry shift with Certificate Lifecycle Management (CLM) software.
Image Blog Security Tool Rationalization: A Powerful Way to Elevate Security Hygiene Amid Budget Constraints October 04, 2023 Discover how to do more with less through security tool rationalization.
Image Blog Maximizing Effectiveness: Justifying Cybersecurity Investments in a Stormy Economy October 03, 2023 Optiv subject matter experts discuss rationalizing technology to maximize effectiveness in uncertain economic times.
Image Blog Understanding API Profiles October 03, 2023 Understanding API usage and profiles is key for an organization’s security maturity. Learn how to classify API usage, exposure, data and compliance.