A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 253 - 264 of 778 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Sacrificing Suspended Processes September 23, 2022 EDR hooking has become a major part of an adversary’s ability to successfully compromise an endpoint system. Hooking is a technique that alters the.... Read the Blog Image Blog Considerations For Uncertain Economic Times: Spending Strategies and Staff Review September 19, 2022 In this article, an Optiv engineering fellow discusses spending types as well as methods for reviewing staffing needs and team member efficiency. Read the Blog Image Blog SecOps Best Practices: Evolve Cyber Recovery to Shore Up Security Operations September 19, 2022 Enhance your SecOps program's response and recovery component with Optiv's CRS, which is critical amid an increasingly uncertain threat landscape. Read the Blog Image Blog Digital Supply Chain Security From the Ground Up September 13, 2022 Digital Supply Chain Security is critical due to open source code and multiple vendors in software supply chains. Know what you have and how to secure.... Read the Blog Image Blog AIOPS From Palo Alto Networks September 08, 2022 Artificial Intelligence for IT Operations (AIOPS) from Palo Alto Networks is simply the smarter security choice. Gain insights while achieving a.... Read the Blog Image Blog State of Ransomware 2022: First Half Review and Predictions September 07, 2022 The state of ransomware 2022. First half review on the Optiv blog. Major threat actors, high-profile victims and predictions of what might lie ahead. Read the Blog Image Blog Insider Threats: The Risk Right Under Your Nose September 06, 2022 Insider threats are hard to detect since the focus tends to be outward. Discover the main actors along with detection and prevention policies on the.... Read the Blog Image Blog Solving the Unredacter Challenge September 01, 2022 Do you think that simple tools like Gaussian blurs can safely redact sensitive content in your online images? See Optiv's solution to the.... Read the Blog Image Blog It’s Time to Move Toward the Autonomous SOC August 31, 2022 Autonomous Security Operations Center are needed to deliver positive security outcomes. Give your team full visility to respond to threats quickly. Read the Blog Image Blog Russia/Ukraine Update - August 2022 August 25, 2022 As cyber warfare from the Russia – Ukraine conflict continues, Optiv’s gTIC provides information on timely events and what to expect looking forward. Read the Blog Image Blog Guide To EDR, NDR, XDR and SIEM August 19, 2022 Infrastructure as Code (IaC) is an efficient and secure way to spin up infrastructure. But It's important to scan IaC templates for errors prior to.... Read the Blog Image Blog Integrated Threat Management: Activities to Boost Your Security Posture August 18, 2022 This post illustrates how the integration of multiple threat management activities can be incorporated into a comprehensive risk strategy. Read the Blog Pagination First page « First Previous page ‹ Previous … Page 18 Page 19 Page 20 Page 21 Current page 22 Page 23 Page 24 Page 25 Page 26 … Next page Next › Last page Last »
Image Blog Sacrificing Suspended Processes September 23, 2022 EDR hooking has become a major part of an adversary’s ability to successfully compromise an endpoint system. Hooking is a technique that alters the....
Image Blog Considerations For Uncertain Economic Times: Spending Strategies and Staff Review September 19, 2022 In this article, an Optiv engineering fellow discusses spending types as well as methods for reviewing staffing needs and team member efficiency.
Image Blog SecOps Best Practices: Evolve Cyber Recovery to Shore Up Security Operations September 19, 2022 Enhance your SecOps program's response and recovery component with Optiv's CRS, which is critical amid an increasingly uncertain threat landscape.
Image Blog Digital Supply Chain Security From the Ground Up September 13, 2022 Digital Supply Chain Security is critical due to open source code and multiple vendors in software supply chains. Know what you have and how to secure....
Image Blog AIOPS From Palo Alto Networks September 08, 2022 Artificial Intelligence for IT Operations (AIOPS) from Palo Alto Networks is simply the smarter security choice. Gain insights while achieving a....
Image Blog State of Ransomware 2022: First Half Review and Predictions September 07, 2022 The state of ransomware 2022. First half review on the Optiv blog. Major threat actors, high-profile victims and predictions of what might lie ahead.
Image Blog Insider Threats: The Risk Right Under Your Nose September 06, 2022 Insider threats are hard to detect since the focus tends to be outward. Discover the main actors along with detection and prevention policies on the....
Image Blog Solving the Unredacter Challenge September 01, 2022 Do you think that simple tools like Gaussian blurs can safely redact sensitive content in your online images? See Optiv's solution to the....
Image Blog It’s Time to Move Toward the Autonomous SOC August 31, 2022 Autonomous Security Operations Center are needed to deliver positive security outcomes. Give your team full visility to respond to threats quickly.
Image Blog Russia/Ukraine Update - August 2022 August 25, 2022 As cyber warfare from the Russia – Ukraine conflict continues, Optiv’s gTIC provides information on timely events and what to expect looking forward.
Image Blog Guide To EDR, NDR, XDR and SIEM August 19, 2022 Infrastructure as Code (IaC) is an efficient and secure way to spin up infrastructure. But It's important to scan IaC templates for errors prior to....
Image Blog Integrated Threat Management: Activities to Boost Your Security Posture August 18, 2022 This post illustrates how the integration of multiple threat management activities can be incorporated into a comprehensive risk strategy.