
May 14, 2024
Optiv's Source Zero team takes you on an internet safari to hunt for HAR files and explore recommendations for defending against token theft attacks.
Blog

May 06, 2024
Discover the key differences between MSP and MSSP and learn how to choose the right service for your IT and cybersecurity needs in our in-depth guide.
Blog

May 03, 2024
Running a SOC is challenging, and adding OT SOC monitoring into the mix brings more challenges. Read Optiv's guidance for developing a strong OT SOC....
Blog

May 02, 2024
Evolving threats and shifts in endpoint security needs makes prioritizing endpoint protection non-negotiable for establishing a proactive approach to....
Blog

April 29, 2024
As identity threats rise, a cohesive approach to identity and access management (IAM) is essential. Read Optiv's advice on modernizing your strategy.
Blog

April 22, 2024
CISA has opened their proposed CIRCIA rule for public comment. See what critical infrastructure entities could be required to report.
Blog

April 19, 2024
The concept of identity security is relatively simple: end users must be granted access to corporate systems and applications to do their jobs, and....
Blog

April 17, 2024
The role of the business information security officer (BISO) may be relatively new and rapidly growing in demand as security information needs grow....
Blog

April 10, 2024
As typosquatting attacks and other threats target the software supply chain, Optiv shares tips for DevSecOps, SBOM and Zero Trust implementations or....
Blog

April 08, 2024
A surge in typosquatting attacks may significantly impact AI/ML development. Read how adversaries leverage OSS vulnerabilities to cause disruption.
Blog

March 28, 2024
NIST released its long-awaited Cybersecurity Framework (CSF) version 2.0 Optiv highlights new additions and guidance that may benefit your business.
Blog

March 28, 2024
Protect your business with the right partner for cybersecurity consulting services. Gain industry-specific insights and expert services tailored to....
Blog