A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 601 - 612 of 778 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Get Control of the Mayhem: A Day in the Life of a Piece of Unstructured Sensitive Data March 21, 2018 Sensitive and relevant data, such as personally identifiable information (PII) or intellectual property, may be running rampant in your organization.... Read the Blog Image Blog Intelligence Bulletin – MinionGhost Reemerges March 21, 2018 At approximately 9:30am EDT on 20 March 2018, hacktivist collective, MinionGhost, announced planned cyber attacks against unspecified Asian entities.... Read the Blog Image Blog Pass-the-Hash March 14, 2018 Pass-the-hash (PtH) is an all too common form of credentials attack, especially since the advent of a tool called Mimikatz. Using PtH to extract from.... Read the Blog Image Blog Observations on Smoke Tests – Part 1 March 13, 2018 Smoke testing in the traditional definition is most often used to assess the functionality of key software features to determine if they work or.... Read the Blog Image Blog Part 2: Frameworks in Context: The Business-Aligned Information Security Program and Control Frameworks March 07, 2018 In part 1 of this series, we provided insights responding to the frequent question regarding control frameworks and their place in the security.... Read the Blog Image Blog PCI Compliance Every Day – Requirement 4 March 06, 2018 In this latest post of my Payment Card Industry Data Security Standard (PCI DSS) compliance blog series, we will explore Requirement 4 of the standard.... Read the Blog Image Blog Part 1: Frameworks in Context: The Business-Aligned Information Security Program and Control Frameworks February 27, 2018 During hundreds of strategy, risk and compliance engagements, Optiv’s consultants often have been asked very thoughtful and deep questions about.... Read the Blog Image Blog The GDPR 90-Day Countdown is on! (No Need to Freak Out) February 25, 2018 May 25, 2018 is a day that many organizations have (or should have) marked on their calendars as a game-changing moment for their business. That’s the.... Read the Blog Image Blog Security Simplified February 14, 2018 It's no secret that data breaches are an ugly reality for businesses today, and despite ever increasing investments, organizations seem unable to stem.... Read the Blog Image Blog Security Lessons Learned from the Olympics February 13, 2018 The 2018 Winter Olympics opening ceremony was last Friday, opening the world stage to elite athletes competing in the latest chapter of these historic.... Read the Blog Image Blog Using Micro-Segmentation to Protect Your Data – Part 2 February 12, 2018 While micro-segmentation, software-defined networking (SDN) and software-defined data center (SDDC) technology providers VMWare, Cisco and Amazon Web.... Read the Blog Image Blog Unmanaged PowerShell Binaries and Endpoint Protection – Part 2 February 07, 2018 In my last blog post, I discussed the process of creating a binary that contained a reverse PowerShell payload, only it did not leverage PowerShell.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 47 Page 48 Page 49 Page 50 Current page 51 Page 52 Page 53 Page 54 Page 55 … Next page Next › Last page Last »
Image Blog Get Control of the Mayhem: A Day in the Life of a Piece of Unstructured Sensitive Data March 21, 2018 Sensitive and relevant data, such as personally identifiable information (PII) or intellectual property, may be running rampant in your organization....
Image Blog Intelligence Bulletin – MinionGhost Reemerges March 21, 2018 At approximately 9:30am EDT on 20 March 2018, hacktivist collective, MinionGhost, announced planned cyber attacks against unspecified Asian entities....
Image Blog Pass-the-Hash March 14, 2018 Pass-the-hash (PtH) is an all too common form of credentials attack, especially since the advent of a tool called Mimikatz. Using PtH to extract from....
Image Blog Observations on Smoke Tests – Part 1 March 13, 2018 Smoke testing in the traditional definition is most often used to assess the functionality of key software features to determine if they work or....
Image Blog Part 2: Frameworks in Context: The Business-Aligned Information Security Program and Control Frameworks March 07, 2018 In part 1 of this series, we provided insights responding to the frequent question regarding control frameworks and their place in the security....
Image Blog PCI Compliance Every Day – Requirement 4 March 06, 2018 In this latest post of my Payment Card Industry Data Security Standard (PCI DSS) compliance blog series, we will explore Requirement 4 of the standard....
Image Blog Part 1: Frameworks in Context: The Business-Aligned Information Security Program and Control Frameworks February 27, 2018 During hundreds of strategy, risk and compliance engagements, Optiv’s consultants often have been asked very thoughtful and deep questions about....
Image Blog The GDPR 90-Day Countdown is on! (No Need to Freak Out) February 25, 2018 May 25, 2018 is a day that many organizations have (or should have) marked on their calendars as a game-changing moment for their business. That’s the....
Image Blog Security Simplified February 14, 2018 It's no secret that data breaches are an ugly reality for businesses today, and despite ever increasing investments, organizations seem unable to stem....
Image Blog Security Lessons Learned from the Olympics February 13, 2018 The 2018 Winter Olympics opening ceremony was last Friday, opening the world stage to elite athletes competing in the latest chapter of these historic....
Image Blog Using Micro-Segmentation to Protect Your Data – Part 2 February 12, 2018 While micro-segmentation, software-defined networking (SDN) and software-defined data center (SDDC) technology providers VMWare, Cisco and Amazon Web....
Image Blog Unmanaged PowerShell Binaries and Endpoint Protection – Part 2 February 07, 2018 In my last blog post, I discussed the process of creating a binary that contained a reverse PowerShell payload, only it did not leverage PowerShell....