
July 07, 2016
Control the installation, spread, and execution of malicious code at multiple points in the enterprise, while optimizing the use of automation to....
Blog

June 30, 2016
An organization’s biggest threat may not come from far away hackers but from its own employees. Your first line of defense is to develop a cyber....
Blog

June 23, 2016
Recently, Optiv’s Global Threat Intelligence Center (gTIC) identified an active phishing campaign against the education sector, in which attackers are....
Blog

June 22, 2016
Minimize the attack surface and the opportunities for attackers to manipulate human behavior through their interaction with web browsers and email....
Blog

June 16, 2016
Collect, manage, and analyze audit logs of events that could help detect, understand, or recover from an attack.
Blog

June 14, 2016
College students are five times more likely to become victims of identity theft than any other demographic, according to The Financial Times. Experts....
Blog

June 09, 2016
The processes and tools used to track/control/prevent/correct the use, assignment, and configuration of administrative privileges on computers....
Blog

June 06, 2016
Today, the Identity Defined Security Alliance (IDSA), led by Ping Identity and Optiv, announced a giant step forward in making the next generation of....
Blog

June 02, 2016
Continuously acquire, assess, and take action on new information in order to identify vulnerabilities, remediate, and minimize the window of....
Blog

May 31, 2016
Actively manage (inventory, track, and correct) all software on the network so that only authorized software is installed and can execute, and that....
Blog

May 26, 2016
Data Rates continue to march upward and many of the limitations of Wi-Fi as we knew it (legacy 802.11a/b/g) have been overcome with features....
Blog

May 24, 2016
Actively manage (inventory, track, and correct) all software on the network so that only authorized software is installed and can execute, and that....
Blog