A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 421 - 432 of 780 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Cloud Security Requires a New Mindset July 07, 2020 To take advantage of the cloud‘s benefits, adapt your organization to your new reality. Read the Blog Image Blog Like Tears in Rain: A DeathHiddenTear Ransomware Breakdown July 02, 2020 Here is current analysis insight and a YARA rule to help you detect HiddenTear ransomware variants. Read the Blog Image Blog Aligning Defender ATP Alerts to MITRE ATT&CK - Video Demonstration June 30, 2020 How to prioritize efforts based on alert information from Microsoft Defender ATP, Logic Apps, and Log Analytics. Read the Blog Image Blog Brute Force Account Testing Using Burp Intruder June 19, 2020 Burp Suite’s Intruder tool can be used to automate testing for weak/default passwords. Read the Blog Image Blog Digging Your Talons In – New Take On Password Guessing June 19, 2020 Talon automates a password guessing technique targeting Kerberos and LDAP within the Windows Active Directory environment. Read the Blog Image Blog AI & Cybersecurity: Context is King June 17, 2020 What does artificial intelligence actually mean? Evans Mehew defines it and explains its importance to cybersecurity. Read the Blog Image Blog Keep Me Safe, Make Me Happy (Part 2) June 15, 2020 Secure the customer experience by acknowledging that customers want you to make them happy and keep them safe. Read the Blog Image Blog Infrastructure as Code: Terraform, AWS EKS, Gitlab & Prisma Cloud June 11, 2020 A how to guide using Gitlab, Hashicorp Terraform Cloud, AWS EKS and Palo Alto Networks Prisma Cloud to build and secure a Kubernetes cluster. Read the Blog Image Blog Visual Lock Picking Workstation June 11, 2020 The Visual Lock Picking Workstation displays the inner workings of a lock while teaching lock picking. Read the Blog Image Blog Azure API Management Tracing Helper June 11, 2020 This paper explores the Burp Suite extension for Azure API Management to automatically identify gateway misconfigurations and to display the tracing.... Read the Blog Image Blog Microsoft Defender ATP Telemetry: Workbook Visualizations (Part 3) June 11, 2020 Part 3 of series: Prioritizing Microsoft Defender ATP endpoint alert telemetry with MITRE ATT&CK. Read the Blog Image Blog Microsoft Defender ATP Telemetry: Azure Log Analytics Workspace (Part 2) June 11, 2020 This post demonstrates how to pull DATP data into Azure Log Analytics workspaces using a Logic App. Read the Blog Pagination First page « First Previous page ‹ Previous … Page 32 Page 33 Page 34 Page 35 Current page 36 Page 37 Page 38 Page 39 Page 40 … Next page Next › Last page Last » Subscribe to our newsletter for cutting-edge insights Subscribe
Image Blog Cloud Security Requires a New Mindset July 07, 2020 To take advantage of the cloud‘s benefits, adapt your organization to your new reality.
Image Blog Like Tears in Rain: A DeathHiddenTear Ransomware Breakdown July 02, 2020 Here is current analysis insight and a YARA rule to help you detect HiddenTear ransomware variants.
Image Blog Aligning Defender ATP Alerts to MITRE ATT&CK - Video Demonstration June 30, 2020 How to prioritize efforts based on alert information from Microsoft Defender ATP, Logic Apps, and Log Analytics.
Image Blog Brute Force Account Testing Using Burp Intruder June 19, 2020 Burp Suite’s Intruder tool can be used to automate testing for weak/default passwords.
Image Blog Digging Your Talons In – New Take On Password Guessing June 19, 2020 Talon automates a password guessing technique targeting Kerberos and LDAP within the Windows Active Directory environment.
Image Blog AI & Cybersecurity: Context is King June 17, 2020 What does artificial intelligence actually mean? Evans Mehew defines it and explains its importance to cybersecurity.
Image Blog Keep Me Safe, Make Me Happy (Part 2) June 15, 2020 Secure the customer experience by acknowledging that customers want you to make them happy and keep them safe.
Image Blog Infrastructure as Code: Terraform, AWS EKS, Gitlab & Prisma Cloud June 11, 2020 A how to guide using Gitlab, Hashicorp Terraform Cloud, AWS EKS and Palo Alto Networks Prisma Cloud to build and secure a Kubernetes cluster.
Image Blog Visual Lock Picking Workstation June 11, 2020 The Visual Lock Picking Workstation displays the inner workings of a lock while teaching lock picking.
Image Blog Azure API Management Tracing Helper June 11, 2020 This paper explores the Burp Suite extension for Azure API Management to automatically identify gateway misconfigurations and to display the tracing....
Image Blog Microsoft Defender ATP Telemetry: Workbook Visualizations (Part 3) June 11, 2020 Part 3 of series: Prioritizing Microsoft Defender ATP endpoint alert telemetry with MITRE ATT&CK.
Image Blog Microsoft Defender ATP Telemetry: Azure Log Analytics Workspace (Part 2) June 11, 2020 This post demonstrates how to pull DATP data into Azure Log Analytics workspaces using a Logic App.