A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 649 - 660 of 778 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Avoid User in Training October 05, 2017 Often when I’m onsite with clients, gathering requirements for an identity and access management (IAM) solution implementation, I’m asked, “What are.... Read the Blog Image Blog Online Safety - Simple Steps October 02, 2017 From cyber bullying to obtaining personal and sensitive information through phishing campaigns, harm lurks in many corners of the Internet. With a few.... Read the Blog Image Blog Being Certain about Estimative Uncertainty September 26, 2017 I love it when my teenager says something like, “You know Dad, that’s how they designed it,” when in fact, my child does not have any evidence to.... Read the Blog Image Blog DDoS Threats: Are Your Third Parties Protecting You? September 24, 2017 There’s evidence that ransomware may be evolving beyond holding data hostage. In recent news, DDoS attacks were used as a threat against organizations.... Read the Blog Image Blog A Day in the Life of Optiv Cyber Security Superheroes: Optiv Worldwide September 21, 2017 Deemed the “Silicon Valley of India,” Bangalore is a major hub for many of the top multinational information technology firms, software companies, and.... Read the Blog Image Blog Six Key Alignments for CISO's on Cloud Security September 20, 2017 Many CISO's and security teams are struggling with developing and executing an effective cloud security strategy, especially one that can keep up with.... Read the Blog Image Blog The Need for Augmented Intelligence September 07, 2017 Cyber threat intelligence can be a lot harder than you think. As a regular speaker at various conferences, I’m constantly asked the question about how.... Read the Blog Image Blog The Cybersecurity Mega Cycle Aftermath September 06, 2017 During the past decade, we have witnessed a virtual explosion in the cybersecurity world. While serving as CEO of McAfee and FireEye, and a U.S. Army.... Read the Blog Image Blog A Day in the Life of Optiv Cyber Security Superheroes: Pete Arzamendi August 24, 2017 Whether it’s cyber security or his passion for Jiu-Jitsu, Pete Arzamendi enjoys the art of combat and the constant search for attacks throughout the.... Read the Blog Image Blog A Day in the Life of Optiv Cyber Security Superheroes: Chris Patten August 09, 2017 You could say Chris Patten’s passion for cyber security all started with yard sales. Growing up in the Midwest, Chris and his dad wandered local yard.... Read the Blog Image Blog A Day in the Life of Optiv Cyber Security Superheroes: Keyana Jones August 09, 2017 Keyana’s mantra of ‘unlocking tomorrow’ is clear when she enters the room at the Opt-In New Employee Training session. She wastes no time dispersing.... Read the Blog Image Blog Recovering From a Credential Breach, Part 2 August 09, 2017 Probably the most important step to take when a user suspects that his or her user account has been compromised is to notify the organization’s IT.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 51 Page 52 Page 53 Page 54 Current page 55 Page 56 Page 57 Page 58 Page 59 … Next page Next › Last page Last »
Image Blog Avoid User in Training October 05, 2017 Often when I’m onsite with clients, gathering requirements for an identity and access management (IAM) solution implementation, I’m asked, “What are....
Image Blog Online Safety - Simple Steps October 02, 2017 From cyber bullying to obtaining personal and sensitive information through phishing campaigns, harm lurks in many corners of the Internet. With a few....
Image Blog Being Certain about Estimative Uncertainty September 26, 2017 I love it when my teenager says something like, “You know Dad, that’s how they designed it,” when in fact, my child does not have any evidence to....
Image Blog DDoS Threats: Are Your Third Parties Protecting You? September 24, 2017 There’s evidence that ransomware may be evolving beyond holding data hostage. In recent news, DDoS attacks were used as a threat against organizations....
Image Blog A Day in the Life of Optiv Cyber Security Superheroes: Optiv Worldwide September 21, 2017 Deemed the “Silicon Valley of India,” Bangalore is a major hub for many of the top multinational information technology firms, software companies, and....
Image Blog Six Key Alignments for CISO's on Cloud Security September 20, 2017 Many CISO's and security teams are struggling with developing and executing an effective cloud security strategy, especially one that can keep up with....
Image Blog The Need for Augmented Intelligence September 07, 2017 Cyber threat intelligence can be a lot harder than you think. As a regular speaker at various conferences, I’m constantly asked the question about how....
Image Blog The Cybersecurity Mega Cycle Aftermath September 06, 2017 During the past decade, we have witnessed a virtual explosion in the cybersecurity world. While serving as CEO of McAfee and FireEye, and a U.S. Army....
Image Blog A Day in the Life of Optiv Cyber Security Superheroes: Pete Arzamendi August 24, 2017 Whether it’s cyber security or his passion for Jiu-Jitsu, Pete Arzamendi enjoys the art of combat and the constant search for attacks throughout the....
Image Blog A Day in the Life of Optiv Cyber Security Superheroes: Chris Patten August 09, 2017 You could say Chris Patten’s passion for cyber security all started with yard sales. Growing up in the Midwest, Chris and his dad wandered local yard....
Image Blog A Day in the Life of Optiv Cyber Security Superheroes: Keyana Jones August 09, 2017 Keyana’s mantra of ‘unlocking tomorrow’ is clear when she enters the room at the Opt-In New Employee Training session. She wastes no time dispersing....
Image Blog Recovering From a Credential Breach, Part 2 August 09, 2017 Probably the most important step to take when a user suspects that his or her user account has been compromised is to notify the organization’s IT....