A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 661 - 672 of 778 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog PCI Compliance Every Day – Requirement 7 August 08, 2017 This post focuses on PCI DSS requirement seven; restricting access to cardholder data and in-scope system components based on the “need to know” and.... Read the Blog Image Blog Recovering From a Credential Breach, Part 1 August 02, 2017 A few years ago while on a business trip, I was out to dinner and left my luggage in my rental car (I had not yet checked in to my hotel). When I.... Read the Blog Image Blog Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 20 July 30, 2017 Test the overall strength of an organization’s defenses (the technology, the process and the people) by simulating the objectives and actions of an.... Read the Blog Image Blog DEF CON is Here: A Reminder to Manage and Remediate Security Vulnerabilities of Your Third Parties July 27, 2017 Every year I like to take a look at the talks at Black Hat and DEFCON to see if there are areas of risk I need to review. This year, like others, has.... Read the Blog Image Blog Control Maturity vs. Control Risk: A Client Discussion July 17, 2017 A client for whom I serve as CISO advisor posed an interesting question to me last week, “What if we measure and report on control maturity instead of.... Read the Blog Image Blog A Day in the Life of Optiv Cyber Security Superheroes: Nick Hyatt July 12, 2017 Nick always had an inquisitive mind. At a very young age, his father would watch as he sat at the family’s new TRS-80 microcomputer marveling at the.... Read the Blog Image Blog Indicators of Compromise (IOCs) are Not Intelligence July 05, 2017 When discussing the topic of cyber threat intelligence, I frequently hear questions about Indicators of Compromise (IOCs). IOCs are not intelligence.... Read the Blog Image Blog The Patriot Award: Optiv’s Andy Maidment Makes a Special Tribute to his Supervisor, Andrew Coons July 04, 2017 When Andy Maidment found out about the Patriot Award during his annual civilian employment review, he immediately knew he wanted to nominate his.... Read the Blog Image Blog Update: Intelligence Advisory – Petya Outbreak June 29, 2017 This is an update to the Intelligence Advisory: Petya Ransomware Outbreak - released June 27, 2017. Optiv’s Global Threat Intelligence Center (gTIC).... Read the Blog Image Blog Petya / Petna / NotPetya Ransomware Recommendations from the Trenches June 28, 2017 Here we go again. Not long ago I updated a blog post containing actionable recommendations to protect your environment from ransomware threats.... Read the Blog Image Blog The Most Important Threats for Your Organization to Watch June 26, 2017 The Optiv Cyber Threat Intelligence Estimate 2017 is a yearly report that reviews important events of the past calendar year, and uses them to make.... Read the Blog Image Blog Intelligence Advisory – New Petya Ransomware Outbreak June 26, 2017 Optiv’s Global Threat Intelligence Center (gTIC) received reports from several sources concerning a recent modification to the Petya ransomware strain.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 52 Page 53 Page 54 Page 55 Current page 56 Page 57 Page 58 Page 59 Page 60 … Next page Next › Last page Last »
Image Blog PCI Compliance Every Day – Requirement 7 August 08, 2017 This post focuses on PCI DSS requirement seven; restricting access to cardholder data and in-scope system components based on the “need to know” and....
Image Blog Recovering From a Credential Breach, Part 1 August 02, 2017 A few years ago while on a business trip, I was out to dinner and left my luggage in my rental car (I had not yet checked in to my hotel). When I....
Image Blog Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 20 July 30, 2017 Test the overall strength of an organization’s defenses (the technology, the process and the people) by simulating the objectives and actions of an....
Image Blog DEF CON is Here: A Reminder to Manage and Remediate Security Vulnerabilities of Your Third Parties July 27, 2017 Every year I like to take a look at the talks at Black Hat and DEFCON to see if there are areas of risk I need to review. This year, like others, has....
Image Blog Control Maturity vs. Control Risk: A Client Discussion July 17, 2017 A client for whom I serve as CISO advisor posed an interesting question to me last week, “What if we measure and report on control maturity instead of....
Image Blog A Day in the Life of Optiv Cyber Security Superheroes: Nick Hyatt July 12, 2017 Nick always had an inquisitive mind. At a very young age, his father would watch as he sat at the family’s new TRS-80 microcomputer marveling at the....
Image Blog Indicators of Compromise (IOCs) are Not Intelligence July 05, 2017 When discussing the topic of cyber threat intelligence, I frequently hear questions about Indicators of Compromise (IOCs). IOCs are not intelligence....
Image Blog The Patriot Award: Optiv’s Andy Maidment Makes a Special Tribute to his Supervisor, Andrew Coons July 04, 2017 When Andy Maidment found out about the Patriot Award during his annual civilian employment review, he immediately knew he wanted to nominate his....
Image Blog Update: Intelligence Advisory – Petya Outbreak June 29, 2017 This is an update to the Intelligence Advisory: Petya Ransomware Outbreak - released June 27, 2017. Optiv’s Global Threat Intelligence Center (gTIC)....
Image Blog Petya / Petna / NotPetya Ransomware Recommendations from the Trenches June 28, 2017 Here we go again. Not long ago I updated a blog post containing actionable recommendations to protect your environment from ransomware threats....
Image Blog The Most Important Threats for Your Organization to Watch June 26, 2017 The Optiv Cyber Threat Intelligence Estimate 2017 is a yearly report that reviews important events of the past calendar year, and uses them to make....
Image Blog Intelligence Advisory – New Petya Ransomware Outbreak June 26, 2017 Optiv’s Global Threat Intelligence Center (gTIC) received reports from several sources concerning a recent modification to the Petya ransomware strain....