A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 529 - 540 of 780 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog ATT&CK Series: Execution May 07, 2019 Once initial access has been obtained, attackers usually need a way of getting into places that their initial foothold can't get to. This can be.... Read the Blog Image Blog Organizations Shift from Identity and Access Management to Identity and Data Management May 01, 2019 With the exponential growth in unstructured data each year, coupled with cloud adoption and IoT devices, it is critical that organizations begin to.... Read the Blog Image Blog ATT&CK Series: Credential Access April 25, 2019 Once initial access has been obtained, attackers usually need a way of getting into places that their initial foothold can't get to. This can be.... Read the Blog Image Blog MythBusters: Debunking Five Common Identity and Data Management Myths April 17, 2019 Debunking common myths about IDM. Examples: too expensive and complex; current IT teams can't support IDM evolution; custom is better; company data/IP.... Read the Blog Image Blog That Time I Clicked on a Phish April 16, 2019 Even the savviest of us can “fall for” a phishing email. Here are a few things to look for to help spot them quicker. Read the Blog Image Blog Indecent Proposal? When Identity, Privacy and Ethics Collide April 10, 2019 Users expect data privacy – and regulations require it. Yet, security measures require full visibility into all data in the business ecosystem. This.... Read the Blog Image Blog Network Trust: How to Maintain and Establish it in Your Perimeter April 09, 2019 Everyone has heard about “the expanding attack surface” and the “ever-increasing amounts of data;” about employees wanting to access email on their.... Read the Blog Image Blog Why Identity Matters in a Strategic Identity and Data Management Programme April 03, 2019 Keeping identity centre stage in your security strategy will help prevent breaches and the misuse of personal data. Taking a strategic approach is.... Read the Blog Image Blog ATT&CK Series: Persistence April 02, 2019 In this post, we will cover ATT&CK’s Persistence techniques and tactics that an attacker may employ to maintain their presence following initial.... Read the Blog Image Blog Future-Proofing your Business with Identity-Centric Security March 27, 2019 Creating and executing a truly identity-centric security strategy is more subjective than just “block” or “allow.” It takes a nuanced, subtle.... Read the Blog Image Blog Conversations with the Board March 26, 2019 Building and maintaining a world-class cybersecurity program is about partnering with the people who have the most influence, C-suite executives and.... Read the Blog Image Blog Machine Learning: Make Cybersecurity a Priority March 21, 2019 Organizations are investing billions in ML to try and analyze data better and improve things like decision-making or customer satisfaction. However.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 41 Page 42 Page 43 Page 44 Current page 45 Page 46 Page 47 Page 48 Page 49 … Next page Next › Last page Last » Subscribe to our newsletter for cutting-edge insights Subscribe
Image Blog ATT&CK Series: Execution May 07, 2019 Once initial access has been obtained, attackers usually need a way of getting into places that their initial foothold can't get to. This can be....
Image Blog Organizations Shift from Identity and Access Management to Identity and Data Management May 01, 2019 With the exponential growth in unstructured data each year, coupled with cloud adoption and IoT devices, it is critical that organizations begin to....
Image Blog ATT&CK Series: Credential Access April 25, 2019 Once initial access has been obtained, attackers usually need a way of getting into places that their initial foothold can't get to. This can be....
Image Blog MythBusters: Debunking Five Common Identity and Data Management Myths April 17, 2019 Debunking common myths about IDM. Examples: too expensive and complex; current IT teams can't support IDM evolution; custom is better; company data/IP....
Image Blog That Time I Clicked on a Phish April 16, 2019 Even the savviest of us can “fall for” a phishing email. Here are a few things to look for to help spot them quicker.
Image Blog Indecent Proposal? When Identity, Privacy and Ethics Collide April 10, 2019 Users expect data privacy – and regulations require it. Yet, security measures require full visibility into all data in the business ecosystem. This....
Image Blog Network Trust: How to Maintain and Establish it in Your Perimeter April 09, 2019 Everyone has heard about “the expanding attack surface” and the “ever-increasing amounts of data;” about employees wanting to access email on their....
Image Blog Why Identity Matters in a Strategic Identity and Data Management Programme April 03, 2019 Keeping identity centre stage in your security strategy will help prevent breaches and the misuse of personal data. Taking a strategic approach is....
Image Blog ATT&CK Series: Persistence April 02, 2019 In this post, we will cover ATT&CK’s Persistence techniques and tactics that an attacker may employ to maintain their presence following initial....
Image Blog Future-Proofing your Business with Identity-Centric Security March 27, 2019 Creating and executing a truly identity-centric security strategy is more subjective than just “block” or “allow.” It takes a nuanced, subtle....
Image Blog Conversations with the Board March 26, 2019 Building and maintaining a world-class cybersecurity program is about partnering with the people who have the most influence, C-suite executives and....
Image Blog Machine Learning: Make Cybersecurity a Priority March 21, 2019 Organizations are investing billions in ML to try and analyze data better and improve things like decision-making or customer satisfaction. However....