A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 541 - 552 of 778 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog The Business-Centric Risk Strategy March 12, 2019 Many organizations are reaching a breaking point when it comes to the effectiveness of their cybersecurity. Security teams are overwhelmed with the.... Read the Blog Image Blog ATT&CK Series: Discovery March 07, 2019 Modern information technology has rocketed the business sector to impressive heights, as innovative devices and software solutions are implemented.... Read the Blog Image Blog How Can You Determine the Risk of a Threat Actor? March 05, 2019 One of the primary goals of an intelligence team is to prioritize the threats that face an organization. This includes how a particular threat actor.... Read the Blog Image Blog Learning the Enemy Perspective February 26, 2019 Make offensive security games, and regular penetration testing part of your ongoing threat management program and your team will gain knowledge to be.... Read the Blog Image Blog Features of a Threat Intelligence Platform February 14, 2019 A Threat Intelligence Platform (TIP) is a fantastic way to manage intelligence and its process amongst individual teams and communities, including.... Read the Blog Image Blog Security in 2019: Getting Ahead of the Game February 07, 2019 The year 2018 was not much different than recent years in the world of security: Several massive security incidents at large companies and government.... Read the Blog Image Blog It’s Not Always About the Perimeter – A Look at Domain Reconnaissance January 29, 2019 In this information age, security threats are commonplace and can be devastating to a business. The ability to quickly and accurately detect cyber.... Read the Blog Image Blog IoC and IoA: Indicators of Intelligence January 24, 2019 Intelligence seems to be full of three-letter acronyms, including Indicators of Compromise (IoC) and Indicators of Attack (IoA). The difference.... Read the Blog Image Blog Let’s Not Talk About the Past December 20, 2018 With the year quickly coming to a close, the web is full of blogs titled, “A Look Back at 2018,” and “2018: A Post-Mortem.” We’ve decided to give you.... Read the Blog Image Blog SecOps vs. DevOps in the Information Age December 18, 2018 Information is varied and complex, involving many data types, structures, and protocols for different types of data sets. This increases challenges.... Read the Blog Image Blog Tales from Trenches: What’s on Your Shelf? December 13, 2018 Don’t you hate it when you forget something? Like when you take your kids on a hike and forget a snack, or take your dog for a walk and forget those.... Read the Blog Image Blog Darknet Done Right December 11, 2018 The marriage of a well-managed risk program and a targeted Darknet operation to move towards mitigation of risk is an ROI most mature companies have.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 42 Page 43 Page 44 Page 45 Current page 46 Page 47 Page 48 Page 49 Page 50 … Next page Next › Last page Last »
Image Blog The Business-Centric Risk Strategy March 12, 2019 Many organizations are reaching a breaking point when it comes to the effectiveness of their cybersecurity. Security teams are overwhelmed with the....
Image Blog ATT&CK Series: Discovery March 07, 2019 Modern information technology has rocketed the business sector to impressive heights, as innovative devices and software solutions are implemented....
Image Blog How Can You Determine the Risk of a Threat Actor? March 05, 2019 One of the primary goals of an intelligence team is to prioritize the threats that face an organization. This includes how a particular threat actor....
Image Blog Learning the Enemy Perspective February 26, 2019 Make offensive security games, and regular penetration testing part of your ongoing threat management program and your team will gain knowledge to be....
Image Blog Features of a Threat Intelligence Platform February 14, 2019 A Threat Intelligence Platform (TIP) is a fantastic way to manage intelligence and its process amongst individual teams and communities, including....
Image Blog Security in 2019: Getting Ahead of the Game February 07, 2019 The year 2018 was not much different than recent years in the world of security: Several massive security incidents at large companies and government....
Image Blog It’s Not Always About the Perimeter – A Look at Domain Reconnaissance January 29, 2019 In this information age, security threats are commonplace and can be devastating to a business. The ability to quickly and accurately detect cyber....
Image Blog IoC and IoA: Indicators of Intelligence January 24, 2019 Intelligence seems to be full of three-letter acronyms, including Indicators of Compromise (IoC) and Indicators of Attack (IoA). The difference....
Image Blog Let’s Not Talk About the Past December 20, 2018 With the year quickly coming to a close, the web is full of blogs titled, “A Look Back at 2018,” and “2018: A Post-Mortem.” We’ve decided to give you....
Image Blog SecOps vs. DevOps in the Information Age December 18, 2018 Information is varied and complex, involving many data types, structures, and protocols for different types of data sets. This increases challenges....
Image Blog Tales from Trenches: What’s on Your Shelf? December 13, 2018 Don’t you hate it when you forget something? Like when you take your kids on a hike and forget a snack, or take your dog for a walk and forget those....
Image Blog Darknet Done Right December 11, 2018 The marriage of a well-managed risk program and a targeted Darknet operation to move towards mitigation of risk is an ROI most mature companies have....