A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 757 - 768 of 778 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Could Lack of Security Awareness Cost $1 Billion? March 23, 2016 The conventional wisdom says that the difference between robbery and fraud is this: in a robbery you know money was stolen, but you don't know who.... Read the Blog Image Blog Tax Season Attacks – Part 4, Dumpster Diving March 22, 2016 Dumpster diving is the practice of combing through commercial or residential waste to find items that have been discarded by their owners. During tax.... Read the Blog Image Blog Do I Need a Firewall or a Web Application Firewall? March 20, 2016 In typical consultant fashion, the answer is: ‘yes' or 'it depends'. It’s important to know the difference between these functions and it’s important.... Read the Blog Image Blog Tax Season Attacks – Part 3, Shoulder Surfing March 16, 2016 Shoulder surfing certainly is not the most technical form of identity theft, but it has been an effective means to commit fraud. Shoulder surfing is.... Read the Blog Image Blog Working in the Trenches: How to Unlock Tomorrow for our Future Workforce March 09, 2016 The shortage of talent in the cyber security industry is a growing concern among many industry leaders and the pain is specifically palpable within.... Read the Blog Image Blog Tax Season Attacks – Part 2, Phishing March 08, 2016 Tax season is officially upon us, and with it brings out a host of scams against taxpayers. In this blog series we explore three specific attacks.... Read the Blog Image Blog What is Ransomware and the 8 Things You Can Do to Prevent Becoming a Victim March 02, 2016 Ransomware is a term used to describe malware that is installed on a user’s computing device (without the user’s knowledge or permission), that.... Read the Blog Image Blog Tax Season Attacks – Part 1 February 28, 2016 It’s the same routine every year during tax season, employers send out important tax information such as W-2s to their employees, television and radio.... Read the Blog Image Blog The Creature of the Black Network Lagoon February 11, 2016 We often don’t worry about network security outside of work and at times, we probably don’t even worry about it while we’re at work. When we stop.... Read the Blog Image Blog Reducing Your Personal Attack Surface February 10, 2016 Many of us are consumers of technology, I would consider myself in the upper echelon of this group. I own multiple laptops, desktops, servers, cloud.... Read the Blog Image Blog “The Network” is Always “Guilty” January 27, 2016 Are you an IT professional responsible for your user’s network? You are not protected by the legal system’s defense “innocent until proven guilty” in.... Read the Blog Image Blog Breaking Credit Card Tokenization – Part 4 January 20, 2016 Remember that the main point of credit card tokenization is to keep PANs (Primary Account Numbers) out of the main application-hosting environment.... Read the Blog Pagination First page « First Previous page ‹ Previous … Page 57 Page 58 Page 59 Page 60 Page 61 Page 62 Page 63 Current page 64 Page 65 Next page Next › Last page Last »
Image Blog Could Lack of Security Awareness Cost $1 Billion? March 23, 2016 The conventional wisdom says that the difference between robbery and fraud is this: in a robbery you know money was stolen, but you don't know who....
Image Blog Tax Season Attacks – Part 4, Dumpster Diving March 22, 2016 Dumpster diving is the practice of combing through commercial or residential waste to find items that have been discarded by their owners. During tax....
Image Blog Do I Need a Firewall or a Web Application Firewall? March 20, 2016 In typical consultant fashion, the answer is: ‘yes' or 'it depends'. It’s important to know the difference between these functions and it’s important....
Image Blog Tax Season Attacks – Part 3, Shoulder Surfing March 16, 2016 Shoulder surfing certainly is not the most technical form of identity theft, but it has been an effective means to commit fraud. Shoulder surfing is....
Image Blog Working in the Trenches: How to Unlock Tomorrow for our Future Workforce March 09, 2016 The shortage of talent in the cyber security industry is a growing concern among many industry leaders and the pain is specifically palpable within....
Image Blog Tax Season Attacks – Part 2, Phishing March 08, 2016 Tax season is officially upon us, and with it brings out a host of scams against taxpayers. In this blog series we explore three specific attacks....
Image Blog What is Ransomware and the 8 Things You Can Do to Prevent Becoming a Victim March 02, 2016 Ransomware is a term used to describe malware that is installed on a user’s computing device (without the user’s knowledge or permission), that....
Image Blog Tax Season Attacks – Part 1 February 28, 2016 It’s the same routine every year during tax season, employers send out important tax information such as W-2s to their employees, television and radio....
Image Blog The Creature of the Black Network Lagoon February 11, 2016 We often don’t worry about network security outside of work and at times, we probably don’t even worry about it while we’re at work. When we stop....
Image Blog Reducing Your Personal Attack Surface February 10, 2016 Many of us are consumers of technology, I would consider myself in the upper echelon of this group. I own multiple laptops, desktops, servers, cloud....
Image Blog “The Network” is Always “Guilty” January 27, 2016 Are you an IT professional responsible for your user’s network? You are not protected by the legal system’s defense “innocent until proven guilty” in....
Image Blog Breaking Credit Card Tokenization – Part 4 January 20, 2016 Remember that the main point of credit card tokenization is to keep PANs (Primary Account Numbers) out of the main application-hosting environment....