A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 529 - 540 of 789 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Blockchain: Why Security Hyper-Vigilance is Recommended June 11, 2019 Blockchain’s long-term role in digital transformation is to be determined, although it’s likely to be a key player. Like other nascent technologies.... Read the Blog Image Blog How to Govern Digital Identities and Access in a DX World June 10, 2019 Recently, the emergence of Identity Governance as-a-Service has helped solve some of these issues and automate the process of governing identities.... Read the Blog Image Blog Protect Yourself from BYOT (Bring Your Own Threat) June 05, 2019 With the increase in mobile and remote work environments, organizations can be at risk or under threat by not securing devices, access and credentials.... Read the Blog Image Blog Four Ways to Reduce Identity and Data Risks in a Digital Economy May 29, 2019 The use of stolen credentials ranks as one of the most commonly seen aspects of cybersecurity incidents, and loss of unencrypted data is one of the.... Read the Blog Image Blog Modernise your Privileged Access Security May 22, 2019 Privileged Access Security should not be viewed mainly as the implementation of a PAS or PAM technology and augmented (or integrated) with other third.... Read the Blog Image Blog Privacy Across the Pond, Part 2 May 15, 2019 From consumerization to IoT devices to a tax on chardonnay — CTO and Head of Strategy, Andrzej Kawalec and GM and Global Vice President of Digital.... Read the Blog Image Blog ATT&CK Series: Defense Evasion May 14, 2019 There are multiple ways that an attacker can hide while attempting to access a network and move laterally within it. Windows systems often.... Read the Blog Image Blog Business Email Compromise (BEC) Fraud is Exploiting the Cloud May 09, 2019 Business Email Compromise (BEC) fraud has been officially tracked by the FBI since 2013 and has been identified in more than 100 countries with losses.... Read the Blog Image Blog Privacy Across the Pond, Part 1 May 08, 2019 From privacy to identity to work-life flow — CTO and Head of Strategy, Andrzej Kawalec and GM and Global Vice President of Digital Identity and Data.... Read the Blog Image Blog ATT&CK Series: Execution May 07, 2019 Once initial access has been obtained, attackers usually need a way of getting into places that their initial foothold can't get to. This can be.... Read the Blog Image Blog Organizations Shift from Identity and Access Management to Identity and Data Management May 01, 2019 With the exponential growth in unstructured data each year, coupled with cloud adoption and IoT devices, it is critical that organizations begin to.... Read the Blog Image Blog ATT&CK Series: Credential Access April 25, 2019 Once initial access has been obtained, attackers usually need a way of getting into places that their initial foothold can't get to. This can be.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 41 Page 42 Page 43 Page 44 Current page 45 Page 46 Page 47 Page 48 Page 49 … Next page Next › Last page Last » Subscribe to our newsletter for cutting-edge insights Subscribe
Image Blog Blockchain: Why Security Hyper-Vigilance is Recommended June 11, 2019 Blockchain’s long-term role in digital transformation is to be determined, although it’s likely to be a key player. Like other nascent technologies....
Image Blog How to Govern Digital Identities and Access in a DX World June 10, 2019 Recently, the emergence of Identity Governance as-a-Service has helped solve some of these issues and automate the process of governing identities....
Image Blog Protect Yourself from BYOT (Bring Your Own Threat) June 05, 2019 With the increase in mobile and remote work environments, organizations can be at risk or under threat by not securing devices, access and credentials....
Image Blog Four Ways to Reduce Identity and Data Risks in a Digital Economy May 29, 2019 The use of stolen credentials ranks as one of the most commonly seen aspects of cybersecurity incidents, and loss of unencrypted data is one of the....
Image Blog Modernise your Privileged Access Security May 22, 2019 Privileged Access Security should not be viewed mainly as the implementation of a PAS or PAM technology and augmented (or integrated) with other third....
Image Blog Privacy Across the Pond, Part 2 May 15, 2019 From consumerization to IoT devices to a tax on chardonnay — CTO and Head of Strategy, Andrzej Kawalec and GM and Global Vice President of Digital....
Image Blog ATT&CK Series: Defense Evasion May 14, 2019 There are multiple ways that an attacker can hide while attempting to access a network and move laterally within it. Windows systems often....
Image Blog Business Email Compromise (BEC) Fraud is Exploiting the Cloud May 09, 2019 Business Email Compromise (BEC) fraud has been officially tracked by the FBI since 2013 and has been identified in more than 100 countries with losses....
Image Blog Privacy Across the Pond, Part 1 May 08, 2019 From privacy to identity to work-life flow — CTO and Head of Strategy, Andrzej Kawalec and GM and Global Vice President of Digital Identity and Data....
Image Blog ATT&CK Series: Execution May 07, 2019 Once initial access has been obtained, attackers usually need a way of getting into places that their initial foothold can't get to. This can be....
Image Blog Organizations Shift from Identity and Access Management to Identity and Data Management May 01, 2019 With the exponential growth in unstructured data each year, coupled with cloud adoption and IoT devices, it is critical that organizations begin to....
Image Blog ATT&CK Series: Credential Access April 25, 2019 Once initial access has been obtained, attackers usually need a way of getting into places that their initial foothold can't get to. This can be....