A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 673 - 684 of 780 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog The Most Important Threats for Your Organization to Watch June 26, 2017 The Optiv Cyber Threat Intelligence Estimate 2017 is a yearly report that reviews important events of the past calendar year, and uses them to make.... Read the Blog Image Blog Intelligence Advisory – New Petya Ransomware Outbreak June 26, 2017 Optiv’s Global Threat Intelligence Center (gTIC) received reports from several sources concerning a recent modification to the Petya ransomware strain.... Read the Blog Image Blog What Changes will EO 13800 Bring to Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure? June 21, 2017 Anyone who has held the position of CIO or CISO in a government agency or bureau can tell you implementing an effective information risk management.... Read the Blog Image Blog Cyber Threat Intelligence – Putting out Fires or Firefighting? June 19, 2017 When it comes to fighting malware, combating nation-state threats, and securing digital assets, the information security industry has much to learn.... Read the Blog Image Blog Implementing an Identity Centric Approach June 18, 2017 With the latest Verizon Data Breach Incident Report finding that 81 percent of hacking related breaches leveraged either stolen and/or weak passwords.... Read the Blog Image Blog Thank You for the Help! June 14, 2017 One of the more influential things in my life that directed me towards a career in information security was the 1983 movie, WarGames. I was already a.... Read the Blog Image Blog Risk Management and Intelligence: What is Your End Game? May 30, 2017 Anyone worth their salt in the world of cyber threat intelligence is always focused on the actionable outcome – how can I lower my business risk by.... Read the Blog Image Blog Having an Identity Crisis? CISO’s Need to Own IAM May 24, 2017 Within any company, we can find owners for every key function throughout the enterprise. If we ask, “who is in charge of human resources?” we know the.... Read the Blog Image Blog Three Steps for Management and Remediation of Security Vulnerabilities with Third Parties May 23, 2017 Over the years, security organizations have had to deal with many vulnerabilities that required quick response and remediation. Some examples that.... Read the Blog Image Blog Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 19 May 21, 2017 Protect the organization’s information, as well as its reputation, by developing and implementing an incident response infrastructure (e.g. plans.... Read the Blog Image Blog What We Look for When Staffing Cyber Security Positions May 17, 2017 It’s a well-known fact that there is a talent gap in the security industry. There are simply not enough qualified people to staff the positions in our.... Read the Blog Image Blog WannaCry Ransomware Recommendations from the Trenches May 18, 2017 Approximately one year ago, I wrote a blog post containing actionable recommendations to protect your environment from ransomware threats. In the wake.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 53 Page 54 Page 55 Page 56 Current page 57 Page 58 Page 59 Page 60 Page 61 … Next page Next › Last page Last » Subscribe to our newsletter for cutting-edge insights Subscribe
Image Blog The Most Important Threats for Your Organization to Watch June 26, 2017 The Optiv Cyber Threat Intelligence Estimate 2017 is a yearly report that reviews important events of the past calendar year, and uses them to make....
Image Blog Intelligence Advisory – New Petya Ransomware Outbreak June 26, 2017 Optiv’s Global Threat Intelligence Center (gTIC) received reports from several sources concerning a recent modification to the Petya ransomware strain....
Image Blog What Changes will EO 13800 Bring to Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure? June 21, 2017 Anyone who has held the position of CIO or CISO in a government agency or bureau can tell you implementing an effective information risk management....
Image Blog Cyber Threat Intelligence – Putting out Fires or Firefighting? June 19, 2017 When it comes to fighting malware, combating nation-state threats, and securing digital assets, the information security industry has much to learn....
Image Blog Implementing an Identity Centric Approach June 18, 2017 With the latest Verizon Data Breach Incident Report finding that 81 percent of hacking related breaches leveraged either stolen and/or weak passwords....
Image Blog Thank You for the Help! June 14, 2017 One of the more influential things in my life that directed me towards a career in information security was the 1983 movie, WarGames. I was already a....
Image Blog Risk Management and Intelligence: What is Your End Game? May 30, 2017 Anyone worth their salt in the world of cyber threat intelligence is always focused on the actionable outcome – how can I lower my business risk by....
Image Blog Having an Identity Crisis? CISO’s Need to Own IAM May 24, 2017 Within any company, we can find owners for every key function throughout the enterprise. If we ask, “who is in charge of human resources?” we know the....
Image Blog Three Steps for Management and Remediation of Security Vulnerabilities with Third Parties May 23, 2017 Over the years, security organizations have had to deal with many vulnerabilities that required quick response and remediation. Some examples that....
Image Blog Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 19 May 21, 2017 Protect the organization’s information, as well as its reputation, by developing and implementing an incident response infrastructure (e.g. plans....
Image Blog What We Look for When Staffing Cyber Security Positions May 17, 2017 It’s a well-known fact that there is a talent gap in the security industry. There are simply not enough qualified people to staff the positions in our....
Image Blog WannaCry Ransomware Recommendations from the Trenches May 18, 2017 Approximately one year ago, I wrote a blog post containing actionable recommendations to protect your environment from ransomware threats. In the wake....