A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 613 - 624 of 778 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Intelligence Bulletin – When Cryptomining Attacks February 06, 2018 Optiv has seen a continuation of attacks based off the usage of CryptoNight miner, in this case likely mining Monero cryptocurrency for the attackers.... Read the Blog Image Blog What Is SSL Web Inspection and Where Should It Occur? (Part 3) February 05, 2018 In parts one and two of this blog series, I provided an overview of SSL web inspection, and dove deeper into how SSL inspection solutions work and.... Read the Blog Image Blog Cloud Critical Controls January 30, 2018 It’s no secret – organizations are moving to the cloud faster than their security teams can secure them. The daunting task of catching up to the.... Read the Blog Image Blog What Is SSL Web Inspection and Where Should It Occur? (Part 2) January 28, 2018 Hardware will vary between vendors and even different models within a vendor’s catalog. Some models/vendors will offload complex CPU tasks (decryption.... Read the Blog Image Blog What Is SSL Web Inspection and Where Should It Occur? (Part 1) January 24, 2018 SSL inspection is the process of “proxying” a SSL session in order to decrypt the traffic and monitor/inspect it against various controls. Network.... Read the Blog Image Blog The Aftermath of Meltdown and Spectre: Now What? January 16, 2018 The recent unveiling of the widely reported Meltdown and Spectre attacks, which exploit critical vulnerabilities in modern processors, sent many.... Read the Blog Image Blog The Fundamentals of Identity and Access Management January 15, 2018 Identity and access management (IAM) is an exciting world filled with dreams of business enablement while reducing risks and implementing security.... Read the Blog Image Blog Regarding Spectre and Meltdown January 11, 2018 On January 3, 2018, the Graz University of Technology released their papers on identified vulnerabilities dubbed “Meltdown” and “Spectre” via the.... Read the Blog Image Blog Securing the Cloud is About Teamwork December 19, 2017 I spoke about cloud at a conference a few weeks ago, but I still have lots of thoughts on the topic bouncing around in my head. If you haven’t yet.... Read the Blog Image Blog Security vs. End User Experience – Find the Balance December 17, 2017 Have we become so focused on serving our customers that we are willing to cut corners for the sake of speed and convenience, only to subject the.... Read the Blog Image Blog Cyber Threat Intelligence Requires Commitment December 12, 2017 It’s been said that in a breakfast of bacon and eggs, the chicken is involved but the pig is committed. This saying is relevant when implementing a.... Read the Blog Image Blog PCI Requirement Changes Coming in 2018 December 07, 2017 The end of 2017 is quickly approaching, and we thought we should remind you of the PCI requirement changes that are coming next year. Some of these.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 48 Page 49 Page 50 Page 51 Current page 52 Page 53 Page 54 Page 55 Page 56 … Next page Next › Last page Last »
Image Blog Intelligence Bulletin – When Cryptomining Attacks February 06, 2018 Optiv has seen a continuation of attacks based off the usage of CryptoNight miner, in this case likely mining Monero cryptocurrency for the attackers....
Image Blog What Is SSL Web Inspection and Where Should It Occur? (Part 3) February 05, 2018 In parts one and two of this blog series, I provided an overview of SSL web inspection, and dove deeper into how SSL inspection solutions work and....
Image Blog Cloud Critical Controls January 30, 2018 It’s no secret – organizations are moving to the cloud faster than their security teams can secure them. The daunting task of catching up to the....
Image Blog What Is SSL Web Inspection and Where Should It Occur? (Part 2) January 28, 2018 Hardware will vary between vendors and even different models within a vendor’s catalog. Some models/vendors will offload complex CPU tasks (decryption....
Image Blog What Is SSL Web Inspection and Where Should It Occur? (Part 1) January 24, 2018 SSL inspection is the process of “proxying” a SSL session in order to decrypt the traffic and monitor/inspect it against various controls. Network....
Image Blog The Aftermath of Meltdown and Spectre: Now What? January 16, 2018 The recent unveiling of the widely reported Meltdown and Spectre attacks, which exploit critical vulnerabilities in modern processors, sent many....
Image Blog The Fundamentals of Identity and Access Management January 15, 2018 Identity and access management (IAM) is an exciting world filled with dreams of business enablement while reducing risks and implementing security....
Image Blog Regarding Spectre and Meltdown January 11, 2018 On January 3, 2018, the Graz University of Technology released their papers on identified vulnerabilities dubbed “Meltdown” and “Spectre” via the....
Image Blog Securing the Cloud is About Teamwork December 19, 2017 I spoke about cloud at a conference a few weeks ago, but I still have lots of thoughts on the topic bouncing around in my head. If you haven’t yet....
Image Blog Security vs. End User Experience – Find the Balance December 17, 2017 Have we become so focused on serving our customers that we are willing to cut corners for the sake of speed and convenience, only to subject the....
Image Blog Cyber Threat Intelligence Requires Commitment December 12, 2017 It’s been said that in a breakfast of bacon and eggs, the chicken is involved but the pig is committed. This saying is relevant when implementing a....
Image Blog PCI Requirement Changes Coming in 2018 December 07, 2017 The end of 2017 is quickly approaching, and we thought we should remind you of the PCI requirement changes that are coming next year. Some of these....