A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 481 - 492 of 780 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Risk Transformation: Bridging Assessment and Execution November 07, 2019 With risk transformation, it can be difficult to bridge the gap between assessment and implementation. Read the Blog Image Blog Cyber Threats, Unintegrated Tools and Alert Fatigue November 06, 2019 Nearly a third of cybersecurity professionals say they ignore alerts because so many are false positives. Read the Blog Image Blog Nemty Ransomware Deployed via Payment Service Phish November 05, 2019 In late August, a new ransomware strain, Nemty, was distributed in the wild. It, coupled with a multitude of other ransomware threats in 2019, demands.... Read the Blog Image Blog How to Get Into Cybersecurity, Even Without a Technical Background October 29, 2019 Many traditional and non-traditional education and training programs can help prepare you for a career in cybersecurity. Read the Blog Image Blog Territory Account Managers: Growing our SalesForce October 24, 2019 We’ve introduced the Territory Account Manager position to help address new, more challenging cybersecurity threats. Read the Blog Image Blog Six Reasons to Consider a Career in Cybersecurity October 22, 2019 One of the most promising career fields is the booming cybersecurity industry. Read the Blog Image Blog Cybersecurity Awareness and the Bystander Effect October 18, 2019 The K12 sector sees a large number of cybersecurity incidents each year, including unauthorized disclosure of data by staff, students and vendors as.... Read the Blog Image Blog Just How Big is Cybercrime, Anyway? October 17, 2019 The global cost of cybercrime is expected to hit $6 trillion annually by 2021. How big a deal is that? By one reckoning cybercrime is already worth $1.... Read the Blog Image Blog 2019 Cyber Threat Intelligence Estimate: Security Must Be Strategic October 16, 2019 The 2019 CTIE shows security practitioners must be familiar with their environments and global trends. Read the Blog Image Blog National Cybersecurity Awareness Month and Cybersecurity Culture October 15, 2019 Promoting a cybersecurity culture and transforming employees into “human firewalls” is effective at reducing vulnerability. Read the Blog Image Blog CloudFormation Templates: What’s in That Stack? October 10, 2019 In this blog we show an example of a basic formation template attack. It’s opportunistic and it would be very hard to target a specific organization.... Read the Blog Image Blog Service Providers and PCI Compliance, Part 3 – Remediating Missing Due Diligence October 08, 2019 Part three of this series addressing an organization's PCI-DSS compliance obligations when they use cloud services (IAAS, PAAS, or SAAS). Part two.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 37 Page 38 Page 39 Page 40 Current page 41 Page 42 Page 43 Page 44 Page 45 … Next page Next › Last page Last » Subscribe to our newsletter for cutting-edge insights Subscribe
Image Blog Risk Transformation: Bridging Assessment and Execution November 07, 2019 With risk transformation, it can be difficult to bridge the gap between assessment and implementation.
Image Blog Cyber Threats, Unintegrated Tools and Alert Fatigue November 06, 2019 Nearly a third of cybersecurity professionals say they ignore alerts because so many are false positives.
Image Blog Nemty Ransomware Deployed via Payment Service Phish November 05, 2019 In late August, a new ransomware strain, Nemty, was distributed in the wild. It, coupled with a multitude of other ransomware threats in 2019, demands....
Image Blog How to Get Into Cybersecurity, Even Without a Technical Background October 29, 2019 Many traditional and non-traditional education and training programs can help prepare you for a career in cybersecurity.
Image Blog Territory Account Managers: Growing our SalesForce October 24, 2019 We’ve introduced the Territory Account Manager position to help address new, more challenging cybersecurity threats.
Image Blog Six Reasons to Consider a Career in Cybersecurity October 22, 2019 One of the most promising career fields is the booming cybersecurity industry.
Image Blog Cybersecurity Awareness and the Bystander Effect October 18, 2019 The K12 sector sees a large number of cybersecurity incidents each year, including unauthorized disclosure of data by staff, students and vendors as....
Image Blog Just How Big is Cybercrime, Anyway? October 17, 2019 The global cost of cybercrime is expected to hit $6 trillion annually by 2021. How big a deal is that? By one reckoning cybercrime is already worth $1....
Image Blog 2019 Cyber Threat Intelligence Estimate: Security Must Be Strategic October 16, 2019 The 2019 CTIE shows security practitioners must be familiar with their environments and global trends.
Image Blog National Cybersecurity Awareness Month and Cybersecurity Culture October 15, 2019 Promoting a cybersecurity culture and transforming employees into “human firewalls” is effective at reducing vulnerability.
Image Blog CloudFormation Templates: What’s in That Stack? October 10, 2019 In this blog we show an example of a basic formation template attack. It’s opportunistic and it would be very hard to target a specific organization....
Image Blog Service Providers and PCI Compliance, Part 3 – Remediating Missing Due Diligence October 08, 2019 Part three of this series addressing an organization's PCI-DSS compliance obligations when they use cloud services (IAAS, PAAS, or SAAS). Part two....