A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 553 - 564 of 778 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Is There a Trans-Atlantic Cyber Divide? The 5 Things That Differentiate Us Can Make Us Stronger December 06, 2018 Having just returned from the U.S. to Europe, we recently met for breakfast around the corner from the new London HQ of Optiv Security, a market.... Read the Blog Image Blog It’s 2018. Password Journals are Still a Thing. November 29, 2018 I was in a store the other day and saw something that, being in cyber security, stopped me fast: A Password Journal. Seriously. A place to write down.... Read the Blog Image Blog Keeping Who-ville Cyber Secure This Holiday Season November 27, 2018 If we were to relate the Grinch to cyber security terms, we’d call him a quintessential threat actor. His sole focus is finding a way to stop.... Read the Blog Image Blog Take a Deep Breath…and Be Thankful November 20, 2018 Ah, Thanksgiving. Time to breathe, greet the holidays and revel in a few days off, time with family, and…what’s that call on your cell? “Suspicious.... Read the Blog Image Blog Tales from Trenches: How a Simple Helpdesk Fix Led to IAM November 15, 2018 By far the best way to prevent a security incident is to prevent the initial access from being obtained in the first place. This is why organizations.... Read the Blog Image Blog ATT&CK Series: Process Injection, Bypass User Account Control, Exploitation for Privilege Escalation November 06, 2018 By far the best way to prevent a security incident is to prevent the initial access from being obtained in the first place. This is why organizations.... Read the Blog Image Blog Titanic - Lessons Learned for Cyber Security October 31, 2018 Computer security professionals are all too familiar with the “cat and mouse” game seen on the global stage of the enemy and defenders. History does.... Read the Blog Image Blog Will Blockchain Change the World? (Part 2) October 30, 2018 In the previous post of this two-part series, we introduced the concept of blockchain and its possible use cases. Blockchain innovation promises.... Read the Blog Image Blog Leveraging Risk Strategy to Move Beyond Check-Box PCI Compliance October 29, 2018 Merchants often put compliance spending at the top of their list for budgeting purposes because the consequences of non-compliance can be expensive.... Read the Blog Image Blog Will Blockchain Change the World? October 23, 2018 There has been a lot of hype around “blockchain” these past few months. After attending sessions, discussing it with others, and researching how it is.... Read the Blog Image Blog Reading Obscure Memory October 18, 2018 Extracting data from memory chips is always an exciting part of any hardware assessment. I have a few chip readers at my disposal which can do the.... Read the Blog Image Blog The Payment Transformation October 16, 2018 It’s important to understand the perspective of both the business and the security leader. Merchants invest heavily in PCI compliance and it’s money.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 43 Page 44 Page 45 Page 46 Current page 47 Page 48 Page 49 Page 50 Page 51 … Next page Next › Last page Last »
Image Blog Is There a Trans-Atlantic Cyber Divide? The 5 Things That Differentiate Us Can Make Us Stronger December 06, 2018 Having just returned from the U.S. to Europe, we recently met for breakfast around the corner from the new London HQ of Optiv Security, a market....
Image Blog It’s 2018. Password Journals are Still a Thing. November 29, 2018 I was in a store the other day and saw something that, being in cyber security, stopped me fast: A Password Journal. Seriously. A place to write down....
Image Blog Keeping Who-ville Cyber Secure This Holiday Season November 27, 2018 If we were to relate the Grinch to cyber security terms, we’d call him a quintessential threat actor. His sole focus is finding a way to stop....
Image Blog Take a Deep Breath…and Be Thankful November 20, 2018 Ah, Thanksgiving. Time to breathe, greet the holidays and revel in a few days off, time with family, and…what’s that call on your cell? “Suspicious....
Image Blog Tales from Trenches: How a Simple Helpdesk Fix Led to IAM November 15, 2018 By far the best way to prevent a security incident is to prevent the initial access from being obtained in the first place. This is why organizations....
Image Blog ATT&CK Series: Process Injection, Bypass User Account Control, Exploitation for Privilege Escalation November 06, 2018 By far the best way to prevent a security incident is to prevent the initial access from being obtained in the first place. This is why organizations....
Image Blog Titanic - Lessons Learned for Cyber Security October 31, 2018 Computer security professionals are all too familiar with the “cat and mouse” game seen on the global stage of the enemy and defenders. History does....
Image Blog Will Blockchain Change the World? (Part 2) October 30, 2018 In the previous post of this two-part series, we introduced the concept of blockchain and its possible use cases. Blockchain innovation promises....
Image Blog Leveraging Risk Strategy to Move Beyond Check-Box PCI Compliance October 29, 2018 Merchants often put compliance spending at the top of their list for budgeting purposes because the consequences of non-compliance can be expensive....
Image Blog Will Blockchain Change the World? October 23, 2018 There has been a lot of hype around “blockchain” these past few months. After attending sessions, discussing it with others, and researching how it is....
Image Blog Reading Obscure Memory October 18, 2018 Extracting data from memory chips is always an exciting part of any hardware assessment. I have a few chip readers at my disposal which can do the....
Image Blog The Payment Transformation October 16, 2018 It’s important to understand the perspective of both the business and the security leader. Merchants invest heavily in PCI compliance and it’s money....