A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 637 - 648 of 778 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog A Day in the Life of Optiv Cyber Security Superheroes: Luke Papineau November 01, 2017 “There are too many vendors…selling too many products!” This outcry is what our client managers hear too many times in the field. Today's.... Read the Blog Image Blog GDPR Part 2: The Six Information Security Pillars October 30, 2017 In this second part of the series, we will discuss Optiv’s Six Information Security Pillars for GDPR compliance. For the information security.... Read the Blog Image Blog Critical Infrastructure Security October 29, 2017 The United States Department of Homeland Security identifies 16 critical infrastructure sectors whose assets, systems and networks—whether physical or.... Read the Blog Image Blog Help Keep Your Children Safe Online October 25, 2017 The Children’s Internet Usage Study conducted by the Center for Cyber Safety and Education discovered that 30 percent of children ages 8-14 use the.... Read the Blog Image Blog GDPR Part 1: A Legal, IT, or Information Security Issue? October 24, 2017 The General Data Protection Regulation (GDPR) is a new regulation affecting organizations that reside in the European Union (EU) or merely transmit EU.... Read the Blog Image Blog KRACK - What you need to know about Key Reinstallation AttaCKs October 23, 2017 On Monday, October 16, researchers announced the discovery of several vulnerabilities within the wireless protocol WPA and WPA2. The details of these.... Read the Blog Image Blog Cybersecurity Careers October 22, 2017 2017 has been a very busy year for cybersecurity professionals. It seems weekly, if not daily, news breaks of a new data breach or intrusion of.... Read the Blog Image Blog PCI Compliance Every Day – Requirement 11 October 18, 2017 The most widely known requirements in PCI DSS 3.2 section 11 with a timing implication are the quarterly external and internal vulnerability scans (11.... Read the Blog Image Blog Criminals Often Prey on Victims… Know the Top 5 Things to Protect Yourself October 17, 2017 Criminals oftentimes utilize current events (natural disasters, large data breaches, public massacres, terrorist attacks, etc.) to target not just the.... Read the Blog Image Blog Predictions for Tomorrow’s Internet October 16, 2017 Currently, an estimated 6.4 billion Internet-of-Things (IoT) devices are connected, with 67 percent residing in North America, Western Europe and.... Read the Blog Image Blog Cybersecurity Awareness: Take Control of Your Identity October 12, 2017 October is National Cybersecurity Awareness Month; the annual campaign led by the U.S. Department of Homeland Security that seeks to raise awareness.... Read the Blog Image Blog From the Boardroom to the Breakroom: Cybersecurity in the Workplace October 10, 2017 Key steps to cybersecurity in the workplace include establishing and maintaining a “security culture” in which company networks and the data they hold.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 50 Page 51 Page 52 Page 53 Current page 54 Page 55 Page 56 Page 57 Page 58 … Next page Next › Last page Last »
Image Blog A Day in the Life of Optiv Cyber Security Superheroes: Luke Papineau November 01, 2017 “There are too many vendors…selling too many products!” This outcry is what our client managers hear too many times in the field. Today's....
Image Blog GDPR Part 2: The Six Information Security Pillars October 30, 2017 In this second part of the series, we will discuss Optiv’s Six Information Security Pillars for GDPR compliance. For the information security....
Image Blog Critical Infrastructure Security October 29, 2017 The United States Department of Homeland Security identifies 16 critical infrastructure sectors whose assets, systems and networks—whether physical or....
Image Blog Help Keep Your Children Safe Online October 25, 2017 The Children’s Internet Usage Study conducted by the Center for Cyber Safety and Education discovered that 30 percent of children ages 8-14 use the....
Image Blog GDPR Part 1: A Legal, IT, or Information Security Issue? October 24, 2017 The General Data Protection Regulation (GDPR) is a new regulation affecting organizations that reside in the European Union (EU) or merely transmit EU....
Image Blog KRACK - What you need to know about Key Reinstallation AttaCKs October 23, 2017 On Monday, October 16, researchers announced the discovery of several vulnerabilities within the wireless protocol WPA and WPA2. The details of these....
Image Blog Cybersecurity Careers October 22, 2017 2017 has been a very busy year for cybersecurity professionals. It seems weekly, if not daily, news breaks of a new data breach or intrusion of....
Image Blog PCI Compliance Every Day – Requirement 11 October 18, 2017 The most widely known requirements in PCI DSS 3.2 section 11 with a timing implication are the quarterly external and internal vulnerability scans (11....
Image Blog Criminals Often Prey on Victims… Know the Top 5 Things to Protect Yourself October 17, 2017 Criminals oftentimes utilize current events (natural disasters, large data breaches, public massacres, terrorist attacks, etc.) to target not just the....
Image Blog Predictions for Tomorrow’s Internet October 16, 2017 Currently, an estimated 6.4 billion Internet-of-Things (IoT) devices are connected, with 67 percent residing in North America, Western Europe and....
Image Blog Cybersecurity Awareness: Take Control of Your Identity October 12, 2017 October is National Cybersecurity Awareness Month; the annual campaign led by the U.S. Department of Homeland Security that seeks to raise awareness....
Image Blog From the Boardroom to the Breakroom: Cybersecurity in the Workplace October 10, 2017 Key steps to cybersecurity in the workplace include establishing and maintaining a “security culture” in which company networks and the data they hold....