A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 301 - 312 of 778 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Now You Know – Varonis Reporting February 28, 2022 The Varonis platform is often underutilized. This post covers how comprehensive, customizable, data-driven and versatile Varonis reporting can be. Read the Blog Image Blog The Best Cyber Defense Is a Good Offense February 24, 2022 The solution to constantly evolving threat actor TTPs is an innovation in mindset that shifts from defensive to offensive thinking. Read the Blog Image Blog Russian Cyber Operations Supplementing Kinetic Military and Shaping Operations (UPDATE) February 23, 2022 This advisory from Optiv’s gTIC covers recent incidents related to Russian military operations in Ukraine and provides cybersecurity recommendations. Read the Blog Image Blog Security Service Edge and Your SASE Journey February 21, 2022 Netskope’s Jason Clark outlines several key tenets for organizing security service edge (SSE) to keep data safe in the cloud. Read the Blog Image Blog Welcome to a Science Fiction World February 18, 2022 This ebook looks at technologies and innovations that will affect cybersecurity in the coming years, including AI, quantum computing and IoT. Read the Blog Image Blog Medical Device Security and Patient Safety February 18, 2022 This post offers a number of basic security recommendations for medical devices. Read the Blog Image Blog Cyber Operations Augmenting Russian Military Operations February 10, 2022 This advisory offers recommendations for organizations potentially affected by Russian state-sponsored activity in Ukraine. Read the Blog Image Blog Why Does Data Privacy Matter? January 28, 2022 When organizations build trust and respect the right to privacy, people are ultimately more likely to continue a business relationship. Read the Blog Image Blog ClassApps Inc. SelectSurvey.NET v5.0 Vulnerabilities Disclosure January 26, 2022 We identified Ivy framework fileless attack techniques that execute undetected in Microsoft Office. Here's how with suggested security augmentations. Read the Blog Image Blog Your TPRM Program: Responsibility and Accountability January 18, 2022 Third-party risk management (TPRM) requires a team approach. Also, don’t reinvent the wheel; an established, proven lifecycle can be very successful. Read the Blog Image Blog Defeating EDRs with Office Products January 11, 2022 We identified Ivy framework fileless attack techniques that execute undetected in Microsoft Office. Here's how with suggested security augmentations. Read the Blog Image Blog Addressing Cyber and Production Risk in OT Environments January 10, 2022 In this series, we explain the threats, issues and impacts associated with managing third-party organizations and discuss how best to minimize risk. Read the Blog Pagination First page « First Previous page ‹ Previous … Page 22 Page 23 Page 24 Page 25 Current page 26 Page 27 Page 28 Page 29 Page 30 … Next page Next › Last page Last »
Image Blog Now You Know – Varonis Reporting February 28, 2022 The Varonis platform is often underutilized. This post covers how comprehensive, customizable, data-driven and versatile Varonis reporting can be.
Image Blog The Best Cyber Defense Is a Good Offense February 24, 2022 The solution to constantly evolving threat actor TTPs is an innovation in mindset that shifts from defensive to offensive thinking.
Image Blog Russian Cyber Operations Supplementing Kinetic Military and Shaping Operations (UPDATE) February 23, 2022 This advisory from Optiv’s gTIC covers recent incidents related to Russian military operations in Ukraine and provides cybersecurity recommendations.
Image Blog Security Service Edge and Your SASE Journey February 21, 2022 Netskope’s Jason Clark outlines several key tenets for organizing security service edge (SSE) to keep data safe in the cloud.
Image Blog Welcome to a Science Fiction World February 18, 2022 This ebook looks at technologies and innovations that will affect cybersecurity in the coming years, including AI, quantum computing and IoT.
Image Blog Medical Device Security and Patient Safety February 18, 2022 This post offers a number of basic security recommendations for medical devices.
Image Blog Cyber Operations Augmenting Russian Military Operations February 10, 2022 This advisory offers recommendations for organizations potentially affected by Russian state-sponsored activity in Ukraine.
Image Blog Why Does Data Privacy Matter? January 28, 2022 When organizations build trust and respect the right to privacy, people are ultimately more likely to continue a business relationship.
Image Blog ClassApps Inc. SelectSurvey.NET v5.0 Vulnerabilities Disclosure January 26, 2022 We identified Ivy framework fileless attack techniques that execute undetected in Microsoft Office. Here's how with suggested security augmentations.
Image Blog Your TPRM Program: Responsibility and Accountability January 18, 2022 Third-party risk management (TPRM) requires a team approach. Also, don’t reinvent the wheel; an established, proven lifecycle can be very successful.
Image Blog Defeating EDRs with Office Products January 11, 2022 We identified Ivy framework fileless attack techniques that execute undetected in Microsoft Office. Here's how with suggested security augmentations.
Image Blog Addressing Cyber and Production Risk in OT Environments January 10, 2022 In this series, we explain the threats, issues and impacts associated with managing third-party organizations and discuss how best to minimize risk.