A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 505 - 516 of 780 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Cybersecurity: Lost Your Keys? September 02, 2019 From time to time we all lose our keys. The solution for physical keys is simple – find the spare set and head down to your local hardware store so.... Read the Blog Image Blog Retro Risk Appetite August 27, 2019 Accepted risk is all too often the result of a lack of priorities around managing risk. It’s all too easy to say “We don’t want to spend $50,000 USD.... Read the Blog Image Blog Is Your Organization GDPR Compliant? Use a Checklist August 20, 2019 Most major organizations are already fully compliant with GDPR. However, some may just now be launching into European markets, and others may have.... Read the Blog Image Blog ATT&CK Series: Command and Control August 06, 2019 In this post, we will review ATT&CK’s Command and Control techniques from an attacker’s point of view. The techniques covered here are not inclusive.... Read the Blog Image Blog Cybersecurity Lapses Can Derail the M&A Train July 31, 2019 Typical M&A concerns include overpaying for an acquired company and assimilating cultures. Executives often spend less time worrying about.... Read the Blog Image Blog Managing Security with MITRE ATT&CK July 30, 2019 Optiv has been using the MITRE Adversary Tactics and Techniques and Common Knowledge (ATT&CK) framework to help clients strategically manage.... Read the Blog Image Blog Closing the People, Processes and Technology Gap: How Innovation Can Strengthen Your Cybersecurity Program July 24, 2019 Learn how to achieve the right combination of people, processes and technology to evolve your cybersecurity program. Read the Blog Image Blog SOCs vs. AFCs: What’s the Difference? July 22, 2019 Discover how an AFC differs from a traditional SOC and the top 10 best practices for implementing your own Advanced Fusion Center. Read the Blog Image Blog The Evolution of Cybercrime July 18, 2019 Fayyaz Rajpari, our Executive Services Director discusses this evolution with Ron Darnall, our senior direct of threat intelligence and Ken Dunham.... Read the Blog Image Blog ATT&CK Series: Exfiltration July 16, 2019 In this post, we will address some of the MITRE ATT&CK’s Exfiltration techniques and tactics, from an attacker’s point of view, that may be used to.... Read the Blog Image Blog Will the Real SDP Please Stand Up? July 10, 2019 The term Software Defined Perimeter (SDP) has recently gained popularity and represents a new and agile way to provide secure access in a Zero Trust.... Read the Blog Image Blog ATT&CK Series: Lateral Movement Techniques June 25, 2019 There are several different methods that adversaries can employ to move throughout a network. However, we will cover two techniques commonly used by.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 39 Page 40 Page 41 Page 42 Current page 43 Page 44 Page 45 Page 46 Page 47 … Next page Next › Last page Last » Subscribe to our newsletter for cutting-edge insights Subscribe
Image Blog Cybersecurity: Lost Your Keys? September 02, 2019 From time to time we all lose our keys. The solution for physical keys is simple – find the spare set and head down to your local hardware store so....
Image Blog Retro Risk Appetite August 27, 2019 Accepted risk is all too often the result of a lack of priorities around managing risk. It’s all too easy to say “We don’t want to spend $50,000 USD....
Image Blog Is Your Organization GDPR Compliant? Use a Checklist August 20, 2019 Most major organizations are already fully compliant with GDPR. However, some may just now be launching into European markets, and others may have....
Image Blog ATT&CK Series: Command and Control August 06, 2019 In this post, we will review ATT&CK’s Command and Control techniques from an attacker’s point of view. The techniques covered here are not inclusive....
Image Blog Cybersecurity Lapses Can Derail the M&A Train July 31, 2019 Typical M&A concerns include overpaying for an acquired company and assimilating cultures. Executives often spend less time worrying about....
Image Blog Managing Security with MITRE ATT&CK July 30, 2019 Optiv has been using the MITRE Adversary Tactics and Techniques and Common Knowledge (ATT&CK) framework to help clients strategically manage....
Image Blog Closing the People, Processes and Technology Gap: How Innovation Can Strengthen Your Cybersecurity Program July 24, 2019 Learn how to achieve the right combination of people, processes and technology to evolve your cybersecurity program.
Image Blog SOCs vs. AFCs: What’s the Difference? July 22, 2019 Discover how an AFC differs from a traditional SOC and the top 10 best practices for implementing your own Advanced Fusion Center.
Image Blog The Evolution of Cybercrime July 18, 2019 Fayyaz Rajpari, our Executive Services Director discusses this evolution with Ron Darnall, our senior direct of threat intelligence and Ken Dunham....
Image Blog ATT&CK Series: Exfiltration July 16, 2019 In this post, we will address some of the MITRE ATT&CK’s Exfiltration techniques and tactics, from an attacker’s point of view, that may be used to....
Image Blog Will the Real SDP Please Stand Up? July 10, 2019 The term Software Defined Perimeter (SDP) has recently gained popularity and represents a new and agile way to provide secure access in a Zero Trust....
Image Blog ATT&CK Series: Lateral Movement Techniques June 25, 2019 There are several different methods that adversaries can employ to move throughout a network. However, we will cover two techniques commonly used by....