A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 61 - 72 of 778 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Navigating Threats in the Wild with the Help of AI and Cross-Domain Telemetry August 20, 2024 These days, cybersecurity can feel like the unpredictable environment of a jungle — complete with wild animals and danger seemingly around every turn.... Read the Blog Image Blog Preparing for a Quantum World: Examining the Migration Path of Hybrid Certificates August 20, 2024 For the migration to quantum-safe cryptography, the term “hybrid” is often used. In some discussions, the term itself leads to a deeper dive into what.... Read the Blog Image Blog Closing the Gap During Cybersecurity Awareness Month: Aligning Perceived and Actual Human Risk July 31, 2024 The human element is a top factor in security breaches. Explore how business leaders can drive cultural change toward real-world concerns. Read the Blog Image Blog Safely Enabling Generative AI with Zero Trust and Security Service Edge (SSE) Capabilities July 17, 2024 Generative AI has had a firestorm of attention, and security teams are reacting quickly as employees, contractors and business partners leverage the.... Read the Blog Image Blog Make Threat Hunting Easier with Endpoint Detection and Response (EDR) July 09, 2024 With a strategic endpoint detection and response (EDR) solution, organizations trade complexity and cost for easier and more effective threat hunting. Read the Blog Image Blog Risk to Resilience – Prioritizing Security in Your Cloud Transformation July 03, 2024 Migrating your organization to the cloud offers organizations a multitude of compelling benefits. Read Optiv's latest blog on starting your cloud.... Read the Blog Image Blog Top Cybersecurity Trends for Global Enterprises in 2024 July 03, 2024 Discover the top cybersecurity trends for global enterprises in 2024, from the resurgence of social engineering to the skills gap challenge and learn.... Read the Blog Image Blog Embracing Secure AI: Unlocking the Power of AI Literacy and Awareness July 03, 2024 Take Optiv’s free course on AI literacy and AI awareness. Topics include understanding AI security, AI myths, AI bias and other emerging AI trends.... Read the Blog Image Blog Building a Proactive and Adaptive Cybersecurity Strategy: Insights for Enterprise Success July 01, 2024 Adjust to evolving threats with a proactive and adaptive cybersecurity strategy. Key insights that help you build resilient defenses. Read the Blog Image Blog Cybersecurity Maturity Requires Evolving Endpoint Protection June 26, 2024 Five features boards should ensure are part of their endpoint protection platform. Read the Blog Image Blog Why it Pays to Have a Comprehensive API Security Strategy June 17, 2024 In an era dominated by digital connectivity and technological advancements, APIs play a pivotal role in facilitating seamless communication and data.... Read the Blog Image Blog Got DSPM? June 07, 2024 How can data security posture management (DSPM) help enhance company maturity? Optiv explains how DSPM can go beyond data discovery. Read the Blog Pagination First page « First Previous page ‹ Previous … Page 2 Page 3 Page 4 Page 5 Current page 6 Page 7 Page 8 Page 9 Page 10 … Next page Next › Last page Last »
Image Blog Navigating Threats in the Wild with the Help of AI and Cross-Domain Telemetry August 20, 2024 These days, cybersecurity can feel like the unpredictable environment of a jungle — complete with wild animals and danger seemingly around every turn....
Image Blog Preparing for a Quantum World: Examining the Migration Path of Hybrid Certificates August 20, 2024 For the migration to quantum-safe cryptography, the term “hybrid” is often used. In some discussions, the term itself leads to a deeper dive into what....
Image Blog Closing the Gap During Cybersecurity Awareness Month: Aligning Perceived and Actual Human Risk July 31, 2024 The human element is a top factor in security breaches. Explore how business leaders can drive cultural change toward real-world concerns.
Image Blog Safely Enabling Generative AI with Zero Trust and Security Service Edge (SSE) Capabilities July 17, 2024 Generative AI has had a firestorm of attention, and security teams are reacting quickly as employees, contractors and business partners leverage the....
Image Blog Make Threat Hunting Easier with Endpoint Detection and Response (EDR) July 09, 2024 With a strategic endpoint detection and response (EDR) solution, organizations trade complexity and cost for easier and more effective threat hunting.
Image Blog Risk to Resilience – Prioritizing Security in Your Cloud Transformation July 03, 2024 Migrating your organization to the cloud offers organizations a multitude of compelling benefits. Read Optiv's latest blog on starting your cloud....
Image Blog Top Cybersecurity Trends for Global Enterprises in 2024 July 03, 2024 Discover the top cybersecurity trends for global enterprises in 2024, from the resurgence of social engineering to the skills gap challenge and learn....
Image Blog Embracing Secure AI: Unlocking the Power of AI Literacy and Awareness July 03, 2024 Take Optiv’s free course on AI literacy and AI awareness. Topics include understanding AI security, AI myths, AI bias and other emerging AI trends....
Image Blog Building a Proactive and Adaptive Cybersecurity Strategy: Insights for Enterprise Success July 01, 2024 Adjust to evolving threats with a proactive and adaptive cybersecurity strategy. Key insights that help you build resilient defenses.
Image Blog Cybersecurity Maturity Requires Evolving Endpoint Protection June 26, 2024 Five features boards should ensure are part of their endpoint protection platform.
Image Blog Why it Pays to Have a Comprehensive API Security Strategy June 17, 2024 In an era dominated by digital connectivity and technological advancements, APIs play a pivotal role in facilitating seamless communication and data....
Image Blog Got DSPM? June 07, 2024 How can data security posture management (DSPM) help enhance company maturity? Optiv explains how DSPM can go beyond data discovery.