A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
OPTIV/SOURCE ZERO Latest news and research on red and blue team security capabilities, objective tool analysis and step-by-step solutions. The Source Zero® platform provides a space for the Optiv community to share their knowledge, research and tools. See our newest insights on subjects ranging from ethical hacking to threat intelligence to application security. Image Search Terms Type - Any -BlogToolVideo Team - Any -RedBluePurple/No Team Sort By LatestOldest Image Understanding a Zone-Based Incident Recovery Model December 05, 2024 Learn why the Zone-Based Incident Recovery Model is the accepted best practice for organizations to quickly recover from large-scale cyber incidents. See Details Blog Image Updated Guidance for Entra ID Emergency Access Accounts (EAAs) December 05, 2024 Don’t get locked out of your M365 tenant in an emergency. Review our best practices for emergency access accounts in Entra ID. See Details Blog Image Top Five Budget-Friendly OT Networking Improvements for Small Manufacturers September 18, 2024 Securing OT networks does not have to break the bank. Learn five budget-friendly OT networking improvements recommended for small manufacturers. See Details Blog Image Gaining a Foothold: Transitioning into a Penetration Testing Career September 11, 2024 Want to transition into a penetration testing career, but don't know where to start? Learn key preparation steps to land your dream job. See Details Blog Image Enhancing Your SDLC with AI Model Vulnerability Scanning August 02, 2024 Discover how AI models are susceptible to poisoning and trojaning, as well as how AI model scanners can prevent these attacks. See Details Blog Image Fostering Empathetic Communication in Vulnerability Management June 06, 2024 Communication skills are often overlooked in vulnerability management. See Optiv's advice for approaching VM concerns with empathy to improve.... See Details Blog Image Navigating OT Networking and Security in the Cloud Era June 03, 2024 As threats in the OT space evolve, how can security teams adapt the classic Purdue model to address business and compliance needs? Optiv shares key.... See Details Blog Image Don’t Upload Your HAR Files Anywhere (And If You Do, Encrypt Them) May 14, 2024 Optiv's Source Zero team takes you on an internet safari to hunt for HAR files and explore recommendations for defending against token theft attacks. See Details Blog Image Practical Approaches to OT SOC Monitoring May 03, 2024 Running a SOC is challenging, and adding OT SOC monitoring into the mix brings more challenges. Read Optiv's guidance for developing a strong OT SOC.... See Details Blog Image Strengthening the SDLC to Defend the Supply Chain April 10, 2024 As typosquatting attacks and other threats target the software supply chain, Optiv shares tips for DevSecOps, SBOM and Zero Trust implementations or.... See Details Blog Image Securing the Software Supply Chain from Typosquatting Attacks April 08, 2024 A surge in typosquatting attacks may significantly impact AI/ML development. Read how adversaries leverage OSS vulnerabilities to cause disruption. See Details Blog Image Crafting a Successful Vulnerability Management Process Framework March 26, 2024 Process makes (almost) perfect in the world of vulnerability management. Learn to build cross-functional processes to set your team up for success. See Details Blog Pagination Current page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 … Next page Next › Last page Last » Introducing Source Zero Our new technical cybersecurity thought leadership resource, Source Zero, focuses on red and blue team security capabilities, objective tools analysis, and more.
Image Understanding a Zone-Based Incident Recovery Model December 05, 2024 Learn why the Zone-Based Incident Recovery Model is the accepted best practice for organizations to quickly recover from large-scale cyber incidents. See Details Blog
Image Updated Guidance for Entra ID Emergency Access Accounts (EAAs) December 05, 2024 Don’t get locked out of your M365 tenant in an emergency. Review our best practices for emergency access accounts in Entra ID. See Details Blog
Image Top Five Budget-Friendly OT Networking Improvements for Small Manufacturers September 18, 2024 Securing OT networks does not have to break the bank. Learn five budget-friendly OT networking improvements recommended for small manufacturers. See Details Blog
Image Gaining a Foothold: Transitioning into a Penetration Testing Career September 11, 2024 Want to transition into a penetration testing career, but don't know where to start? Learn key preparation steps to land your dream job. See Details Blog
Image Enhancing Your SDLC with AI Model Vulnerability Scanning August 02, 2024 Discover how AI models are susceptible to poisoning and trojaning, as well as how AI model scanners can prevent these attacks. See Details Blog
Image Fostering Empathetic Communication in Vulnerability Management June 06, 2024 Communication skills are often overlooked in vulnerability management. See Optiv's advice for approaching VM concerns with empathy to improve.... See Details Blog
Image Navigating OT Networking and Security in the Cloud Era June 03, 2024 As threats in the OT space evolve, how can security teams adapt the classic Purdue model to address business and compliance needs? Optiv shares key.... See Details Blog
Image Don’t Upload Your HAR Files Anywhere (And If You Do, Encrypt Them) May 14, 2024 Optiv's Source Zero team takes you on an internet safari to hunt for HAR files and explore recommendations for defending against token theft attacks. See Details Blog
Image Practical Approaches to OT SOC Monitoring May 03, 2024 Running a SOC is challenging, and adding OT SOC monitoring into the mix brings more challenges. Read Optiv's guidance for developing a strong OT SOC.... See Details Blog
Image Strengthening the SDLC to Defend the Supply Chain April 10, 2024 As typosquatting attacks and other threats target the software supply chain, Optiv shares tips for DevSecOps, SBOM and Zero Trust implementations or.... See Details Blog
Image Securing the Software Supply Chain from Typosquatting Attacks April 08, 2024 A surge in typosquatting attacks may significantly impact AI/ML development. Read how adversaries leverage OSS vulnerabilities to cause disruption. See Details Blog
Image Crafting a Successful Vulnerability Management Process Framework March 26, 2024 Process makes (almost) perfect in the world of vulnerability management. Learn to build cross-functional processes to set your team up for success. See Details Blog
Would you like to speak to an advisor? Let's Talk Cybersecurity Provide your contact information and we will follow-up shortly. Let's Browse Cybersecurity Just looking? Explore how Optiv serves its ~6,000 clients. Show me AI Security Solutions Show me the Optiv brochure Take me to Optiv's Events page Browse all Services