A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 337 - 348 of 780 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Governing Identities in a Hybrid, Multi-Cloud Environment July 13, 2021 This post explains how identity is central to a secure cloud access governance program. Read the Blog Image Blog Zero Trust is About Changing Security Mentality July 08, 2021 Zero Trust safeguards assets and data in the cloud, but organizations should also invest in building a Zero Trust culture. Read the Blog Image Blog What Does the Cybersecurity Executive Order Mean for You? June 29, 2021 The executive order on cybersecurity emphasizes coordinated, mandated levels of controls to respond to a growing threat to critical infrastructure. Read the Blog Image Blog Go365: Office 365 Password Spraying Tool June 17, 2021 Go365 performs user enumeration and password spraying attacks on organizations that use Office 365. Read the Blog Image Blog Combating Ransomware – Protecting a Nation’s Critical Infrastructure June 17, 2021 Recent high-profile cyber attacks, including the Colonial Pipeline ransomware and SolarWinds supply chain hacks, led to the White House executive.... Read the Blog Image Blog Kubernetes Attack Surface June 17, 2021 Optiv highlights the attack strategy of using forged Kerberos tickets to compromise a domain, and provides ways to defend against it. Read the Blog Image Blog Kerberos - A Domains Achille's Heel June 02, 2021 Optiv highlights the attack strategy of using forged Kerberos tickets to compromise a domain, and provides ways to defend against it. Read the Blog Image Blog Introducing an Automated Approach to Risk Management May 26, 2021 The constant churn of audit and compliance testing drives the need for an automated risk management approach. Read the Blog Image Blog Three Ways to Drive Networking-Security Team Collaboration May 24, 2021 In this guest post, CyberGRX examines cyber attack vectors and offers advice on securing third-party relationships. Read the Blog Image Blog Cybersecurity: Making the World a Better Place May 19, 2021 Sam Smith says he’s proud to be part of an industry that literally helps keep our society from crashing on a daily basis. Read the Blog Image Blog Stop Color-Coding Vulnerabilities, Start Remediating Them May 18, 2021 Optiv’s new remediation pipeline model tests automation before production deployment, thereby speeding up MTTR. Read the Blog Image Blog Breaking the (WDAPT) Rules with COM May 12, 2021 This article explores gaps that allow for the undetected execution of code on systems protected by Microsoft Defender Advanced Threat Protection. Read the Blog Pagination First page « First Previous page ‹ Previous … Page 25 Page 26 Page 27 Page 28 Current page 29 Page 30 Page 31 Page 32 Page 33 … Next page Next › Last page Last » Subscribe to our newsletter for cutting-edge insights Subscribe
Image Blog Governing Identities in a Hybrid, Multi-Cloud Environment July 13, 2021 This post explains how identity is central to a secure cloud access governance program.
Image Blog Zero Trust is About Changing Security Mentality July 08, 2021 Zero Trust safeguards assets and data in the cloud, but organizations should also invest in building a Zero Trust culture.
Image Blog What Does the Cybersecurity Executive Order Mean for You? June 29, 2021 The executive order on cybersecurity emphasizes coordinated, mandated levels of controls to respond to a growing threat to critical infrastructure.
Image Blog Go365: Office 365 Password Spraying Tool June 17, 2021 Go365 performs user enumeration and password spraying attacks on organizations that use Office 365.
Image Blog Combating Ransomware – Protecting a Nation’s Critical Infrastructure June 17, 2021 Recent high-profile cyber attacks, including the Colonial Pipeline ransomware and SolarWinds supply chain hacks, led to the White House executive....
Image Blog Kubernetes Attack Surface June 17, 2021 Optiv highlights the attack strategy of using forged Kerberos tickets to compromise a domain, and provides ways to defend against it.
Image Blog Kerberos - A Domains Achille's Heel June 02, 2021 Optiv highlights the attack strategy of using forged Kerberos tickets to compromise a domain, and provides ways to defend against it.
Image Blog Introducing an Automated Approach to Risk Management May 26, 2021 The constant churn of audit and compliance testing drives the need for an automated risk management approach.
Image Blog Three Ways to Drive Networking-Security Team Collaboration May 24, 2021 In this guest post, CyberGRX examines cyber attack vectors and offers advice on securing third-party relationships.
Image Blog Cybersecurity: Making the World a Better Place May 19, 2021 Sam Smith says he’s proud to be part of an industry that literally helps keep our society from crashing on a daily basis.
Image Blog Stop Color-Coding Vulnerabilities, Start Remediating Them May 18, 2021 Optiv’s new remediation pipeline model tests automation before production deployment, thereby speeding up MTTR.
Image Blog Breaking the (WDAPT) Rules with COM May 12, 2021 This article explores gaps that allow for the undetected execution of code on systems protected by Microsoft Defender Advanced Threat Protection.