A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 673 - 684 of 778 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog What Changes will EO 13800 Bring to Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure? June 21, 2017 Anyone who has held the position of CIO or CISO in a government agency or bureau can tell you implementing an effective information risk management.... Read the Blog Image Blog Cyber Threat Intelligence – Putting out Fires or Firefighting? June 19, 2017 When it comes to fighting malware, combating nation-state threats, and securing digital assets, the information security industry has much to learn.... Read the Blog Image Blog Implementing an Identity Centric Approach June 18, 2017 With the latest Verizon Data Breach Incident Report finding that 81 percent of hacking related breaches leveraged either stolen and/or weak passwords.... Read the Blog Image Blog Thank You for the Help! June 14, 2017 One of the more influential things in my life that directed me towards a career in information security was the 1983 movie, WarGames. I was already a.... Read the Blog Image Blog Risk Management and Intelligence: What is Your End Game? May 30, 2017 Anyone worth their salt in the world of cyber threat intelligence is always focused on the actionable outcome – how can I lower my business risk by.... Read the Blog Image Blog Having an Identity Crisis? CISO’s Need to Own IAM May 24, 2017 Within any company, we can find owners for every key function throughout the enterprise. If we ask, “who is in charge of human resources?” we know the.... Read the Blog Image Blog Three Steps for Management and Remediation of Security Vulnerabilities with Third Parties May 23, 2017 Over the years, security organizations have had to deal with many vulnerabilities that required quick response and remediation. Some examples that.... Read the Blog Image Blog Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 19 May 21, 2017 Protect the organization’s information, as well as its reputation, by developing and implementing an incident response infrastructure (e.g. plans.... Read the Blog Image Blog What We Look for When Staffing Cyber Security Positions May 17, 2017 It’s a well-known fact that there is a talent gap in the security industry. There are simply not enough qualified people to staff the positions in our.... Read the Blog Image Blog WannaCry Ransomware Recommendations from the Trenches May 18, 2017 Approximately one year ago, I wrote a blog post containing actionable recommendations to protect your environment from ransomware threats. In the wake.... Read the Blog Image Blog Ransomware Kill Chain and Controls - Part 2: Once the Crying is Over, the Controls Must Kick In May 16, 2017 In the first part of the blog series, we alluded to the impending danger of ransomware campaigns. It appears the concerns were justified, given the.... Read the Blog Image Blog PCI Compliance Every Day May 09, 2017 The title of this post sounds daunting, does it not? However, achieving PCI compliance every day is not as daunting as you might think. With the.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 53 Page 54 Page 55 Page 56 Current page 57 Page 58 Page 59 Page 60 Page 61 … Next page Next › Last page Last »
Image Blog What Changes will EO 13800 Bring to Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure? June 21, 2017 Anyone who has held the position of CIO or CISO in a government agency or bureau can tell you implementing an effective information risk management....
Image Blog Cyber Threat Intelligence – Putting out Fires or Firefighting? June 19, 2017 When it comes to fighting malware, combating nation-state threats, and securing digital assets, the information security industry has much to learn....
Image Blog Implementing an Identity Centric Approach June 18, 2017 With the latest Verizon Data Breach Incident Report finding that 81 percent of hacking related breaches leveraged either stolen and/or weak passwords....
Image Blog Thank You for the Help! June 14, 2017 One of the more influential things in my life that directed me towards a career in information security was the 1983 movie, WarGames. I was already a....
Image Blog Risk Management and Intelligence: What is Your End Game? May 30, 2017 Anyone worth their salt in the world of cyber threat intelligence is always focused on the actionable outcome – how can I lower my business risk by....
Image Blog Having an Identity Crisis? CISO’s Need to Own IAM May 24, 2017 Within any company, we can find owners for every key function throughout the enterprise. If we ask, “who is in charge of human resources?” we know the....
Image Blog Three Steps for Management and Remediation of Security Vulnerabilities with Third Parties May 23, 2017 Over the years, security organizations have had to deal with many vulnerabilities that required quick response and remediation. Some examples that....
Image Blog Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 19 May 21, 2017 Protect the organization’s information, as well as its reputation, by developing and implementing an incident response infrastructure (e.g. plans....
Image Blog What We Look for When Staffing Cyber Security Positions May 17, 2017 It’s a well-known fact that there is a talent gap in the security industry. There are simply not enough qualified people to staff the positions in our....
Image Blog WannaCry Ransomware Recommendations from the Trenches May 18, 2017 Approximately one year ago, I wrote a blog post containing actionable recommendations to protect your environment from ransomware threats. In the wake....
Image Blog Ransomware Kill Chain and Controls - Part 2: Once the Crying is Over, the Controls Must Kick In May 16, 2017 In the first part of the blog series, we alluded to the impending danger of ransomware campaigns. It appears the concerns were justified, given the....
Image Blog PCI Compliance Every Day May 09, 2017 The title of this post sounds daunting, does it not? However, achieving PCI compliance every day is not as daunting as you might think. With the....