Experiencing a Breach? Newsletter
Main Menu 2
    • Solutions
      • Application Security & Threat
      • AI Security
      • Cloud Security
      • Data Protection
      • Detection & Response
      • Identity Modernization
      • Remediation
      • Resiliency
      • Risk & Privacy
      • Securing Digital Transformation
      • Technology Consolidation
      • Zero Trust
    • Secure Business Outcomes
      • Build Resilience
      • Ensure Compliance
      • Maximize Effectiveness
      • Protect Your Business
    • Government Solutions
      • Optiv + ClearShark
      • Security Technology
      • Professional Services
      • Federal Contracts
    • Industry
      • Canada Operations
      • Healthcare
      • State, Local and Education (SLED)
    • Strategy
      • CMMC
      • Cyber Education
      • Cyber Fraud Strategy (Kill-Chain)
      • Cyber Recovery (CRS)
      • Cyber Strategy & Roadmap
      • Digital Transformation
      • Enterprise Resilience
      • Mergers & Acquisitions
      • SEC Disclosure Readiness
      • Security Maturity
      • Security Operations
      • Security Program Landscape
    • Infrastructure
      • Endpoint Security
      • IOT
      • Network Security
      • Operational Technology
      • Physical Security
    • Identity
      • Digital Access Management
      • Identity Advisory Services (Identity Services)
      • Identity Governance & Administration
      • Privileged Access Management
    • Technology Services
      • Authorized Support Program
      • NSAR
      • OTAV (Bake off)
      • SIEM Services
      • Technology Management
      • Technology Rationalization
    • Application Security
      • AppSec Advisory Services
      • AppSec Assessment
      • AppSec Technology Services
    • Managed Services
      • Co-Managed SIEM
      • Fusion Center/Next Gen SOC
      • Managed Detection and Response (MDR)
      • Managed PAM
      • Vulnerability Management
    • Threat
      • Attack & Penetration Testing
      • Attacker Simulation/Red & Purple Team
      • Incident Readiness
      • Incident Response
      • Ransomware
      • Remediation Services
      • Threat Intelligence
    • Risk
      • Compliance
      • Insider Risk Management
      • PCI DSS Compliance
      • Program Development
      • Risk Automation & Reporting
      • Third-Party Risk Management
    • Data Governance Privacy & Protection
      • Data Governance
      • Data Privacy
      • Data Protection
    • Transformation Services
      • Big Data, Analytics & Artificial Intelligence
      • Cloud Migration & Strategy
      • Connected Devices
      • Data Architecture Transformation (Data Fabric)
      • Orchestration & Automation
      • Software Development
    • View All Services
    • Technology Partners
      • Find a Partner
      • Partner Ecosystem
    • A Single Partner for Everything You Need

       

      With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface.

       

      Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.

    • Discover
      • Blog
      • CISO Periodic Table
      • Cybersecurity Dictionary
      • Downloads
      • Field Guides
      • LinkedIn Live Library
      • Newsletter
      • Videos
    • Source Zero
      • Blog
      • Tools
      • Videos
      • Source Zero Con 2023
    • Image
      Optiv-Ponemon Report 2024-list-image@2x.jpg
      2024 Cybersecurity Threat and Risk Management Report
      Optiv and Ponemon surveyed cybersecurity professionals on their prioritized governance and risk management practices. Read our findings.
      Download Now
      Image
      Security-map-list-image@2x.jpg
      Navigating the Security Technology Landscape
      Navigating the Security Technology Landscape: A Guide to Technologies and Providers white paper is a resource designed to help technology buyers achieve better, more specific security outcomes.
      Download Now
      Image
      future-trends-list-image
      A Visual Future of Cybersecurity
      This ebook looks at technologies and innovations that will affect cybersecurity in the coming years, including AI, quantum computing and IoT.
      Download Now
    • Information
      • About Us
      • Awards
      • Careers
      • Events
      • Executive Briefing Program
      • Leadership
      • Locations
      • Our Approach
      • Success Stories
    • In the News
      • Optiv Newsroom
    • ESG
      • Security and Protecting
      • Expanding Talent and Opportunity
      • Building Community
      • Optiv Chips In
    • We Are Optiv

       

      Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.

       

      However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.

  • Contact
  • Experiencing a Breach? Newsletter
  • Contact Us

Optiv Blog

Image
partner-imperva-476x210px-blue

Rough Thoughts on Mobile/Digital Voting

May 22, 2020

In this guest post, Imperva’s Kunal Anand the challenges facing digital voting.

See Details

Blog

Image
ThoughtLeadership_R&D_Azure-IaaS_Whitepaper_Image-SetListItem-476x210

Azure Native and Third-Party Tools: New White Paper

May 20, 2020

This paper helps you understand cloud infrastructure assessment tools provided with Microsoft Azure and other third parties.

See Details

Blog

Image
Risk-SPFA-list-476x210px

Security and COVID: Moving Past Duct Tape and Baling Twine

May 19, 2020

As COVID operations settle down it’s time to reestablish a strategic cybersecurity mindset.

See Details

Blog

Image
Optiv_Tech-Blog_List_476x210_8

Executive Order: White House takes on Utility Hackers…

May 11, 2020

Managing an OT security program that meets C-Suite budgets and White House expectations is difficult but possible.

See Details

Blog

Image
Optiv_Tech-Blog_List_476x210_5

Energy Sector Critical Infrastructure: The Enemy Perspective

May 07, 2020

This article discusses how threat actors attack critical energy infrastructure and how they achieve success.

See Details

Blog

Image
Overarching_Job-Hunting-During-Covid_Vlog_List_Image-476x210

Cybersecurity and Job-Hunting During COVID-19

May 06, 2020

Optiv discusses the post-COVID careers landscape, offers advice for those interested in cybersecurity.

See Details

Blog

Image
carbon_black_list_item_476x210

Coronavirus: Back-to-Basics Threats, Back-to-Basics Security

May 04, 2020

The need to secure remote workers is a permanent part of the landscape.

See Details

Blog

Image
Threat_ATT&CK-Series_Blog-Image-Set_Web-Hero_1980x465

ATT&CK Series: Collection Tactics – Part Two

April 28, 2020

The NIST Privacy Framework formalizes what risk and privacy professionals already know should be done.

See Details

Blog

Image
22-ways-to-protect-yourself-against-phishing-attacks_list_476x210

COVID-19: From the Mindset of the Attacker

April 24, 2020

We’ve seen lots of COVID-19-related work-from-home tips, but how has it affected the attacker?

See Details

Blog

Image
Threat_Managing-Security-with-MITRE-ATT&CK_list_476x210

Things people haven’t said about Zoom yet... Zoom Security Management Strategy

April 23, 2020

This post addresses potential Zoom security flaws that haven’t yet been addressed in the media.

See Details

Blog

Image
partner_rsa_#1_list_476x210

Next Steps in Managing a Dynamic Workforce

April 23, 2020

These five steps can reduce remote-work disruptions for your organization.

See Details

Blog

Image
CyberOps_NCSAM-Blog-3_List-Image_476x210

Threat Modeling Apple and Google’s Covid-19 Contact Tracing Technology

April 23, 2020

This FAQ addresses privacy questions you may have about Apple and Google’s Covid-19 Contact Tracing solution.

See Details

Blog

Pagination

  • First page « First
  • Previous page ‹ Previous
  • …
  • Page 32
  • Page 33
  • Page 34
  • Page 35
  • Current page 36
  • Page 37
  • Page 38
  • Page 39
  • Page 40
  • …
  • Next page Next ›
  • Last page Last »
Footer
  • Home
  • Solutions
  • Services
  • Partners
  • Insights
  • About Us
  • Careers

 

© 2020 – 2025. Optiv Security Inc. All Rights Reserved.  Home | Contact | Cookie Policy | Privacy Policy | Terms of Use | Compliance | Sitemap

Subscribe to Our Newsletter

The content provided is for informational purposes only. Links to third party sites are provided for your convenience and do not constitute an endorsement. These sites may not have the same privacy, security or accessibility standards.

Secure greatness®