
March 27, 2023
Tool sprawl can grow into a costly problem that hinders productivity. Read about how to identify and mitigate this issue.
Blog

March 23, 2023
Design is a crucial part of any mature Software Development Lifecycle (SDLC). Discover how you can leverage secure design practices to produce secure....
Blog

March 13, 2023
Whether it's securing your cloud from a data breach or leveraging a firewall solution, Optiv covers need-to-know AWS cloud security best practices.
Blog

March 10, 2023
Our Cyber AI blog series explores the impact AI will have on the cybersecurity industry and what to consider when using or defending against AI.
Blog

March 10, 2023
Regulations are nothing new for utility or oil and gas companies, but for organizations in other industries these regulations could mean they need to....
Blog

March 07, 2023
The global Mergers and Acquisitions (M&A) landscape has been taking interesting turns since the advent of the COVID-19 pandemic in 2020. After a....
Blog

March 03, 2023
Weak and reused passwords won’t keep your data safe. Find out how to strengthen your password security with these best practices.
Blog

March 02, 2023
Optiv's gTIC shares new cybersecurity updates in the Russia-Ukraine war, including DDoS attacks and the use of Telegram for adversary communications.
Blog

March 01, 2023
Rampant ransomware attacks have made cyber insurance a C-suite priority. Despite the raised consciousness, it’s more difficult than ever to secure or....
Blog

February 27, 2023
APIs facilitate the exchange of sensitive data, but they’re often an easy target for hackers. Learn API security best practices in this blog post.
Blog

February 24, 2023
How will cybersecurity continue to evolve in 2023? Optiv's Threat Engineering Fellow Curtis Fechner shares his thoughts on the outlook for 2023.
Blog

February 23, 2023
Optiv's gTIC team provides a prioritized software and services list covering exploitation trends and vulnerabilities in Oracle WebLogic.
Blog