A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 373 - 384 of 780 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Ideology-based Threats in Response to Civil Unrest January 13, 2021 Organizations need to coordinate and prepare for any potential attack, whether digital or physical, relating to last week’s U.S. Capitol violence. Read the Blog Image Blog Black Friday, Cybersecurity, COVID: Ecommerce is Under Attack December 15, 2020 An integrated application security platform will help retailers operate efficiently and securely throughout the holidays and beyond. Read the Blog Image Blog Abusing AirWatch MDM Services to Bypass MFA December 11, 2020 Our team describes how single-factor authentication attack surfaces can be exposed in the AirWatch MDM suite and what steps to take to mitigate risks. Read the Blog Image Blog Your 2021 Security Strategy: NDR or XDR? December 09, 2020 By working with cloud providers to open up packets to security vendors, network detection/response enables comprehensive visibility in the cloud. Read the Blog Image Blog Key Principles in Building Operational Resilience December 02, 2020 This post articulates the five key principles for building operational resilience across the organization. Read the Blog Image Blog Thought Leadership and Science Fiction November 19, 2020 When your world is so technically advanced it might as well be science fiction, thought leadership always has to be looking around the next corner. Read the Blog Image Blog NIST SP 800-53 Rev 5: Understanding, Preparing for Change November 18, 2020 NIST’s Special Publication 800-53 Revision 5 provides guidance on the next generation of the security and privacy controls framework. Read the Blog Image Blog Insecure API Cloud Computing: The Causes and Solutions November 16, 2020 While cloud APIs can streamline processes, they can also invite in new security risks. ExtraHop’s Matt Cauthorn offers best practices to stay secure. Read the Blog Image Blog Certificate Validation Disabled in Black Duck API Wrapper November 05, 2020 A security vulnerability has been found in the Black Duck Hub REST API Python project (“blackduck” in the PyPI repository). Read more. Read the Blog Image Blog Copying Updated WinAutomation Databases for RPA With Azure Custom Script Extensions November 04, 2020 How to copy updated WinAutomation databases for RPA with Azure custom script extensions – part five of a series. Read the Blog Image Blog Robotic Process Automation with WinAutomation November 04, 2020 Part four in the series: setting up RPA with WinAutomation. Read the Blog Image Blog Tearing Down Azure Resources and Replying to Emails Using Power Automate Flows and Azure Runbooks November 04, 2020 How to use Power Automate flows and Azure runbooks to tear down Azure resources and reply to emails – Dan Kiraly explains in part 7 of the series. Read the Blog Pagination First page « First Previous page ‹ Previous … Page 28 Page 29 Page 30 Page 31 Current page 32 Page 33 Page 34 Page 35 Page 36 … Next page Next › Last page Last » Subscribe to our newsletter for cutting-edge insights Subscribe
Image Blog Ideology-based Threats in Response to Civil Unrest January 13, 2021 Organizations need to coordinate and prepare for any potential attack, whether digital or physical, relating to last week’s U.S. Capitol violence.
Image Blog Black Friday, Cybersecurity, COVID: Ecommerce is Under Attack December 15, 2020 An integrated application security platform will help retailers operate efficiently and securely throughout the holidays and beyond.
Image Blog Abusing AirWatch MDM Services to Bypass MFA December 11, 2020 Our team describes how single-factor authentication attack surfaces can be exposed in the AirWatch MDM suite and what steps to take to mitigate risks.
Image Blog Your 2021 Security Strategy: NDR or XDR? December 09, 2020 By working with cloud providers to open up packets to security vendors, network detection/response enables comprehensive visibility in the cloud.
Image Blog Key Principles in Building Operational Resilience December 02, 2020 This post articulates the five key principles for building operational resilience across the organization.
Image Blog Thought Leadership and Science Fiction November 19, 2020 When your world is so technically advanced it might as well be science fiction, thought leadership always has to be looking around the next corner.
Image Blog NIST SP 800-53 Rev 5: Understanding, Preparing for Change November 18, 2020 NIST’s Special Publication 800-53 Revision 5 provides guidance on the next generation of the security and privacy controls framework.
Image Blog Insecure API Cloud Computing: The Causes and Solutions November 16, 2020 While cloud APIs can streamline processes, they can also invite in new security risks. ExtraHop’s Matt Cauthorn offers best practices to stay secure.
Image Blog Certificate Validation Disabled in Black Duck API Wrapper November 05, 2020 A security vulnerability has been found in the Black Duck Hub REST API Python project (“blackduck” in the PyPI repository). Read more.
Image Blog Copying Updated WinAutomation Databases for RPA With Azure Custom Script Extensions November 04, 2020 How to copy updated WinAutomation databases for RPA with Azure custom script extensions – part five of a series.
Image Blog Robotic Process Automation with WinAutomation November 04, 2020 Part four in the series: setting up RPA with WinAutomation.
Image Blog Tearing Down Azure Resources and Replying to Emails Using Power Automate Flows and Azure Runbooks November 04, 2020 How to use Power Automate flows and Azure runbooks to tear down Azure resources and reply to emails – Dan Kiraly explains in part 7 of the series.