A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 361 - 372 of 780 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Where CASB and SWG Are Headed March 16, 2021 Recent cloud access security brokers and secure web gateways reports suggest we’re rapidly moving toward a secure access service edge future. Read the Blog Image Blog Microsoft Exchange “Hafnium” Hack: Recommended Steps March 10, 2021 Take these immediate steps to protect your data against the recent Microsoft Exchange Server hack. Read the Blog Image Blog SUNBURST, Supply Chain Attacks and How to Detect Them February 26, 2021 Sri Sundaralingam of ExtraHop identifies some common supply chain hack elements and explains how to discover and stop them in the early stages. Read the Blog Image Blog Cybersecurity Helps Me Protect Family, Friends and Myself February 19, 2021 Senior Marketing Product Manager Greg L says working in cybersecurity means protecting your family, your friends and your community. Read the Blog Image Blog Cybersecurity Risk Assessment Tiering February 18, 2021 Risk assessments must consider people, process and technology. A three-tiered approach reduces risk and exposure. Read the Blog Image Blog Automating Captcha Attacks February 17, 2021 Captcha images don’t provide robust protection as a primary security control. This analysis explores how to prevent automated (bot) attacks. Read the Blog Image Blog Attempted Florida Water Supply Tampering Underscores IoT/OT Security Challenges February 10, 2021 Concerned about the recent Florida water system hack? We can help assess and secure your IoT and OT infrastructure. Read the Blog Image Blog Critical Areas in Evaluating Third-Party Risks February 04, 2021 This post addresses key areas organizations should evaluate when reviewing or building out third-party risk management programs. Read the Blog Image Blog EDR and Blending In: How Attackers Avoid Getting Caught February 03, 2021 Even when the hooks are removed, defenders can still leverage other EDR functions, such as host isolation for incident triage or remote. Read the Blog Image Blog Endpoint Detection and Response: How Hackers Have Evolved February 02, 2021 This post identifies systemic endpoint detection and response issues and examines how attackers can bypass any EDR product. Read the Blog Image Blog The Evolution of Cloud Forensics and Incident Response February 01, 2021 Toolsets have evolved for high-fidelity forensics and investigations – here we map them to the MITRE ATT&CK framework for Enterprise Cloud. Read the Blog Image Blog Privacy vs Employee Monitoring and Internal Investigations January 25, 2021 Data privacy typically relates to what corporations do with consumer data, but it’s also important to consider workplace privacy. Read the Blog Pagination First page « First Previous page ‹ Previous … Page 27 Page 28 Page 29 Page 30 Current page 31 Page 32 Page 33 Page 34 Page 35 … Next page Next › Last page Last » Subscribe to our newsletter for cutting-edge insights Subscribe
Image Blog Where CASB and SWG Are Headed March 16, 2021 Recent cloud access security brokers and secure web gateways reports suggest we’re rapidly moving toward a secure access service edge future.
Image Blog Microsoft Exchange “Hafnium” Hack: Recommended Steps March 10, 2021 Take these immediate steps to protect your data against the recent Microsoft Exchange Server hack.
Image Blog SUNBURST, Supply Chain Attacks and How to Detect Them February 26, 2021 Sri Sundaralingam of ExtraHop identifies some common supply chain hack elements and explains how to discover and stop them in the early stages.
Image Blog Cybersecurity Helps Me Protect Family, Friends and Myself February 19, 2021 Senior Marketing Product Manager Greg L says working in cybersecurity means protecting your family, your friends and your community.
Image Blog Cybersecurity Risk Assessment Tiering February 18, 2021 Risk assessments must consider people, process and technology. A three-tiered approach reduces risk and exposure.
Image Blog Automating Captcha Attacks February 17, 2021 Captcha images don’t provide robust protection as a primary security control. This analysis explores how to prevent automated (bot) attacks.
Image Blog Attempted Florida Water Supply Tampering Underscores IoT/OT Security Challenges February 10, 2021 Concerned about the recent Florida water system hack? We can help assess and secure your IoT and OT infrastructure.
Image Blog Critical Areas in Evaluating Third-Party Risks February 04, 2021 This post addresses key areas organizations should evaluate when reviewing or building out third-party risk management programs.
Image Blog EDR and Blending In: How Attackers Avoid Getting Caught February 03, 2021 Even when the hooks are removed, defenders can still leverage other EDR functions, such as host isolation for incident triage or remote.
Image Blog Endpoint Detection and Response: How Hackers Have Evolved February 02, 2021 This post identifies systemic endpoint detection and response issues and examines how attackers can bypass any EDR product.
Image Blog The Evolution of Cloud Forensics and Incident Response February 01, 2021 Toolsets have evolved for high-fidelity forensics and investigations – here we map them to the MITRE ATT&CK framework for Enterprise Cloud.
Image Blog Privacy vs Employee Monitoring and Internal Investigations January 25, 2021 Data privacy typically relates to what corporations do with consumer data, but it’s also important to consider workplace privacy.