A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 505 - 516 of 789 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Cybersecurity: Tech to Buy, Tech to Watch, What’s the Scoop? September 26, 2019 When it comes deciding what cybersecurity technology to invest in, compiling data can keep you from acquiring something that sits on the shelf.... Read the Blog Image Blog ATT&CK Series: Impact September 24, 2019 In this post, we will look at ATT&CK’s Impact Phase as it affects availability and integrity. There are several different techniques adversaries can.... Read the Blog Image Blog What Are the Top Technologies to Watch? September 19, 2019 What technology should you look at investing in? Endpoint? Zero Trust Architecture? Security Awareness Training? SOAR? Digital transformation, which.... Read the Blog Image Blog Einstein and Security Awareness September 18, 2019 October is National Cybersecurity Awareness Month – NCSAM. Security awareness programs are designed to educate end-users about cyber threats and what.... Read the Blog Image Blog Some of the Top Cybersecurity Technology Buying Trends September 12, 2019 Keeping up with and evaluating cybersecurity technologies can be a continuous and ongoing challenge for organizations. To make this effort easier.... Read the Blog Image Blog ATT&CK Series: Collection Tactics September 10, 2019 In this post, we will address some of the MITRE ATT&CK’s Collection techniques and tactics, from an attacker’s point of view to harvest organizational.... Read the Blog Image Blog Privacy Programs as Foundational Security September 09, 2019 With mounting regulations, connectivity, and an explosion in data, privacy management programs are critical components of an overall security program.... Read the Blog Image Blog Optiv Associates: Welcoming the Next Generation September 04, 2019 Optiv acknowledges the extraordinary need for security professionals, which is why we’ve decided to create Associate level positions. These roles.... Read the Blog Image Blog Service Providers and PCI Compliance, Part 1 – Cloud Services and Your Obligations September 03, 2019 This post is the first in a three-part series dedicated to companies working with service providers relating to PCI compliance. Part 1 below focuses.... Read the Blog Image Blog Cybersecurity: Lost Your Keys? September 02, 2019 From time to time we all lose our keys. The solution for physical keys is simple – find the spare set and head down to your local hardware store so.... Read the Blog Image Blog Retro Risk Appetite August 27, 2019 Accepted risk is all too often the result of a lack of priorities around managing risk. It’s all too easy to say “We don’t want to spend $50,000 USD.... Read the Blog Image Blog Is Your Organization GDPR Compliant? Use a Checklist August 20, 2019 Most major organizations are already fully compliant with GDPR. However, some may just now be launching into European markets, and others may have.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 39 Page 40 Page 41 Page 42 Current page 43 Page 44 Page 45 Page 46 Page 47 … Next page Next › Last page Last » Subscribe to our newsletter for cutting-edge insights Subscribe
Image Blog Cybersecurity: Tech to Buy, Tech to Watch, What’s the Scoop? September 26, 2019 When it comes deciding what cybersecurity technology to invest in, compiling data can keep you from acquiring something that sits on the shelf....
Image Blog ATT&CK Series: Impact September 24, 2019 In this post, we will look at ATT&CK’s Impact Phase as it affects availability and integrity. There are several different techniques adversaries can....
Image Blog What Are the Top Technologies to Watch? September 19, 2019 What technology should you look at investing in? Endpoint? Zero Trust Architecture? Security Awareness Training? SOAR? Digital transformation, which....
Image Blog Einstein and Security Awareness September 18, 2019 October is National Cybersecurity Awareness Month – NCSAM. Security awareness programs are designed to educate end-users about cyber threats and what....
Image Blog Some of the Top Cybersecurity Technology Buying Trends September 12, 2019 Keeping up with and evaluating cybersecurity technologies can be a continuous and ongoing challenge for organizations. To make this effort easier....
Image Blog ATT&CK Series: Collection Tactics September 10, 2019 In this post, we will address some of the MITRE ATT&CK’s Collection techniques and tactics, from an attacker’s point of view to harvest organizational....
Image Blog Privacy Programs as Foundational Security September 09, 2019 With mounting regulations, connectivity, and an explosion in data, privacy management programs are critical components of an overall security program....
Image Blog Optiv Associates: Welcoming the Next Generation September 04, 2019 Optiv acknowledges the extraordinary need for security professionals, which is why we’ve decided to create Associate level positions. These roles....
Image Blog Service Providers and PCI Compliance, Part 1 – Cloud Services and Your Obligations September 03, 2019 This post is the first in a three-part series dedicated to companies working with service providers relating to PCI compliance. Part 1 below focuses....
Image Blog Cybersecurity: Lost Your Keys? September 02, 2019 From time to time we all lose our keys. The solution for physical keys is simple – find the spare set and head down to your local hardware store so....
Image Blog Retro Risk Appetite August 27, 2019 Accepted risk is all too often the result of a lack of priorities around managing risk. It’s all too easy to say “We don’t want to spend $50,000 USD....
Image Blog Is Your Organization GDPR Compliant? Use a Checklist August 20, 2019 Most major organizations are already fully compliant with GDPR. However, some may just now be launching into European markets, and others may have....