A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 577 - 588 of 778 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Skills Gap – Hiring When There’s No People September 13, 2018 While part of the solution to a robust and complete security program is security automation and orchestration (SAO), do not forget that hackers are.... Read the Blog Image Blog Getting Started with Postman for API Security Testing: Part 2 September 06, 2018 Postman is a useful tool used by many developers to document, test and interact with Application Programming Interfaces (APIs). This post will explore.... Read the Blog Image Blog We Want Robots to Do (Part of) Our Job September 05, 2018 The job of an information security analyst today is rife with repetitive, sometimes mundane tasks that are performed based on the analyst’s best.... Read the Blog Image Blog Gaining Efficiencies in a Cybersecurity Ecosystem August 28, 2018 In cybersecurity, with threat attack surfaces growing larger each day because of cloud, mobile, social media and IoT, it’s harder than ever to keep.... Read the Blog Image Blog Security Operations Efficiency is Not Gained Through a Patchwork of Expensive Security Tools August 28, 2018 Cloud, mobile, social media, IoT and big data have profoundly expanded the attack surface in the latest cyber super cycle, and it’s no surprise.... Read the Blog Image Blog Agile and Proactive Security Assessments of AWS Cloud Deployments July 11, 2018 Most companies have security personnel, but their expertise in the cloud may be limited. To have a team of highly trained AWS security experts on.... Read the Blog Image Blog Managing Custom Roles in Azure July 05, 2018 While using Azure role-based access controls, Microsoft provides a set of built-in roles to meet the needs of providing least privileges. These roles.... Read the Blog Image Blog The Business Trusts the Third Party – Should You? June 08, 2018 In this day and age we are faced with some hard facts within information security. One of those facts is that breaches are imminent and we must be.... Read the Blog Image Blog Quick Tips for Building an Effective AppSec Program – Part 3 June 06, 2018 This is the last post in my series on creating an effective AppSec program within your organization. In my last post, we discussed the importance of.... Read the Blog Image Blog Phishing - The Rest of the Story May 29, 2018 Receiving an email lure designed to trick you into clicking a phishing link and then logging into a fake website has become a common threat. In this.... Read the Blog Image Blog Transforming Logs and Alerts into Actionable Intelligence with UEBA Functionality May 23, 2018 For information security practitioners, the stored value in security data can reduce both costs and risk. The progression of the treatment of log data.... Read the Blog Image Blog Dear Board of Directors, It’s Time to Do the Right Thing and Elevate IAM May 17, 2018 I talk with IT executives regularly and have noticed a trend across industries that is concerning. While the threat of a data breach looms large on.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 45 Page 46 Page 47 Page 48 Current page 49 Page 50 Page 51 Page 52 Page 53 … Next page Next › Last page Last »
Image Blog Skills Gap – Hiring When There’s No People September 13, 2018 While part of the solution to a robust and complete security program is security automation and orchestration (SAO), do not forget that hackers are....
Image Blog Getting Started with Postman for API Security Testing: Part 2 September 06, 2018 Postman is a useful tool used by many developers to document, test and interact with Application Programming Interfaces (APIs). This post will explore....
Image Blog We Want Robots to Do (Part of) Our Job September 05, 2018 The job of an information security analyst today is rife with repetitive, sometimes mundane tasks that are performed based on the analyst’s best....
Image Blog Gaining Efficiencies in a Cybersecurity Ecosystem August 28, 2018 In cybersecurity, with threat attack surfaces growing larger each day because of cloud, mobile, social media and IoT, it’s harder than ever to keep....
Image Blog Security Operations Efficiency is Not Gained Through a Patchwork of Expensive Security Tools August 28, 2018 Cloud, mobile, social media, IoT and big data have profoundly expanded the attack surface in the latest cyber super cycle, and it’s no surprise....
Image Blog Agile and Proactive Security Assessments of AWS Cloud Deployments July 11, 2018 Most companies have security personnel, but their expertise in the cloud may be limited. To have a team of highly trained AWS security experts on....
Image Blog Managing Custom Roles in Azure July 05, 2018 While using Azure role-based access controls, Microsoft provides a set of built-in roles to meet the needs of providing least privileges. These roles....
Image Blog The Business Trusts the Third Party – Should You? June 08, 2018 In this day and age we are faced with some hard facts within information security. One of those facts is that breaches are imminent and we must be....
Image Blog Quick Tips for Building an Effective AppSec Program – Part 3 June 06, 2018 This is the last post in my series on creating an effective AppSec program within your organization. In my last post, we discussed the importance of....
Image Blog Phishing - The Rest of the Story May 29, 2018 Receiving an email lure designed to trick you into clicking a phishing link and then logging into a fake website has become a common threat. In this....
Image Blog Transforming Logs and Alerts into Actionable Intelligence with UEBA Functionality May 23, 2018 For information security practitioners, the stored value in security data can reduce both costs and risk. The progression of the treatment of log data....
Image Blog Dear Board of Directors, It’s Time to Do the Right Thing and Elevate IAM May 17, 2018 I talk with IT executives regularly and have noticed a trend across industries that is concerning. While the threat of a data breach looms large on....