A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 589 - 600 of 780 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Transforming Logs and Alerts into Actionable Intelligence with UEBA Functionality May 23, 2018 For information security practitioners, the stored value in security data can reduce both costs and risk. The progression of the treatment of log data.... Read the Blog Image Blog Dear Board of Directors, It’s Time to Do the Right Thing and Elevate IAM May 17, 2018 I talk with IT executives regularly and have noticed a trend across industries that is concerning. While the threat of a data breach looms large on.... Read the Blog Image Blog Observations on Smoke Tests – Part 3 May 09, 2018 While attending one of our technology partner’s security training courses, the instructor presented on their product’s various features and.... Read the Blog Image Blog Getting Started with Postman for API Security Testing: Part 1 May 02, 2018 Postman is a useful tool used by many developers to document, test and interact with Application Programming Interfaces (APIs). With the ubiquity of.... Read the Blog Image Blog Quick Tips for Building an Effective AppSec Program – Part 2 May 01, 2018 In my last blog post, I talked about what an application security (AppSec) program is and how an organization would go about building a formal program.... Read the Blog Image Blog Thoughts on Breach of Trust vs. a Breach of Security April 25, 2018 General thought: A breach of trust is different than a breach of security. Trust and security, while related, are very different from each other. In.... Read the Blog Image Blog Employees’ Contribution to Breach of Trust April 25, 2018 General thought: A breach of trust is different than a breach of security. Trust and security, while related, are very different from each other. In.... Read the Blog Image Blog Five Application Security Best Practices for Serverless Applications April 24, 2018 Serverless architecture enables applications to be developed and deployed without management of the underlying host or operating system. Instead of a.... Read the Blog Image Blog Customization of IAM Solutions: Risks of Having it Your Way April 19, 2018 Forty years ago Burger King launched a revolution in customization, declaring that they could provide you the power of creating your perfect burger.... Read the Blog Image Blog Testing Password Reset Token Predictability with the Reset-A-Tron Burp Extension April 17, 2018 Most web applications provide a 'forgot my password' feature where a recovery or reset token is delivered to the associated account email address.... Read the Blog Image Blog Observations on Smoke Tests – Part 2 April 12, 2018 There are a variety of scanning tools in the market today, from commercial to open source. Some are intended only for identifying a particular.... Read the Blog Image Blog Quick Tips for Building an Effective AppSec Program – Part 1 April 10, 2018 An application security (AppSec) program can be defined as the set of risk mitigating controls and business functions that support the discovery.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 46 Page 47 Page 48 Page 49 Current page 50 Page 51 Page 52 Page 53 Page 54 … Next page Next › Last page Last » Subscribe to our newsletter for cutting-edge insights Subscribe
Image Blog Transforming Logs and Alerts into Actionable Intelligence with UEBA Functionality May 23, 2018 For information security practitioners, the stored value in security data can reduce both costs and risk. The progression of the treatment of log data....
Image Blog Dear Board of Directors, It’s Time to Do the Right Thing and Elevate IAM May 17, 2018 I talk with IT executives regularly and have noticed a trend across industries that is concerning. While the threat of a data breach looms large on....
Image Blog Observations on Smoke Tests – Part 3 May 09, 2018 While attending one of our technology partner’s security training courses, the instructor presented on their product’s various features and....
Image Blog Getting Started with Postman for API Security Testing: Part 1 May 02, 2018 Postman is a useful tool used by many developers to document, test and interact with Application Programming Interfaces (APIs). With the ubiquity of....
Image Blog Quick Tips for Building an Effective AppSec Program – Part 2 May 01, 2018 In my last blog post, I talked about what an application security (AppSec) program is and how an organization would go about building a formal program....
Image Blog Thoughts on Breach of Trust vs. a Breach of Security April 25, 2018 General thought: A breach of trust is different than a breach of security. Trust and security, while related, are very different from each other. In....
Image Blog Employees’ Contribution to Breach of Trust April 25, 2018 General thought: A breach of trust is different than a breach of security. Trust and security, while related, are very different from each other. In....
Image Blog Five Application Security Best Practices for Serverless Applications April 24, 2018 Serverless architecture enables applications to be developed and deployed without management of the underlying host or operating system. Instead of a....
Image Blog Customization of IAM Solutions: Risks of Having it Your Way April 19, 2018 Forty years ago Burger King launched a revolution in customization, declaring that they could provide you the power of creating your perfect burger....
Image Blog Testing Password Reset Token Predictability with the Reset-A-Tron Burp Extension April 17, 2018 Most web applications provide a 'forgot my password' feature where a recovery or reset token is delivered to the associated account email address....
Image Blog Observations on Smoke Tests – Part 2 April 12, 2018 There are a variety of scanning tools in the market today, from commercial to open source. Some are intended only for identifying a particular....
Image Blog Quick Tips for Building an Effective AppSec Program – Part 1 April 10, 2018 An application security (AppSec) program can be defined as the set of risk mitigating controls and business functions that support the discovery....