A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
OPTIV/SOURCE ZERO Latest news and research on red and blue team security capabilities, objective tool analysis and step-by-step solutions. The Source Zero® platform provides a space for the Optiv community to share their knowledge, research and tools. See our newest insights on subjects ranging from ethical hacking to threat intelligence to application security. Image Search Terms Type - Any -BlogToolVideo Team - Any -RedBluePurple/No Team Sort By LatestOldest Image Bridging the Human Gap in Vulnerability Management February 23, 2024 How can security practitioners break down communication siloes and narrow skills gaps? Learn more from a vulnerability management practice manager. See Details Blog Image Vertical Target Series: Technology, Telecommunications and Academic and Educational Services February 08, 2024 Technology companies and universities have increasingly become victims to ransomware attacks and other cybercriminal activity. Learn the latest. See Details Blog Image Navigating the Digital Landscape of Vulnerability Management February 07, 2024 How do you rationalize security tools and enhance solutions in vulnerability management? Optiv shares strategies for enhancing a VM program. See Details Blog Image Securing API Dependencies January 30, 2024 It is important to secure dependencies that can ultimately impact APIs and you as the owner. Read Optiv's guidance on tools for reviewing your SBOM.... See Details Blog Image Managing Perspectives for Assessment Reports with Few or Zero Findings January 26, 2024 When discussing an assessment report with zero findings, you can transform skepticism into a commitment to continuous improvement. Read how to do this.... See Details Blog Image Optiv’s gTIC Prioritized Software and Services List + MITRE Tactics Part IV: Microsoft Software and Products January 11, 2024 Optiv's Global Threat Intelligence Center (gTIC) highlights key vulnerabilities and threats impacting prioritized software and services. See Details Blog Image Vulnerability Management Program Fundamentals December 13, 2023 Building a vulnerability management (VM) program involves strategizing on policy, team organization and metrics. Learn how to strengthen a VM program. See Details Blog Image Optiv’s gTIC Prioritized Software and Services List + MITRE Tactics Part V: VMware Software and Products December 12, 2023 Adversaries exploit flaws in VMware software to gain initial access, achieve persistence and more. Read about these threats and techniques. See Details Blog Image Investigating an Adversary-in-the-Middle (AiTM) Phishing Email December 11, 2023 How do adversaries leverage QR codes to bypass MFA controls in phishing attacks? Learn more from red and blue teamer perspectives. See Details Blog Image gTIC Prioritized List + MITRE Tactics November 29, 2023 Optiv's® Global Threat Intelligence Center (gTIC) observed, collected, and analyzed multiple data points and information derived from Optiv's own.... See Details Blog Image Redirectors: A Red Teamer’s Introduction November 20, 2023 Redirectors can enable operators to restrict and control the flow of traffic to C2 servers. Learn the use cases and implementation of redirectors. See Details Blog Image Vertical Target Series: Industrials and Industrial Sub-Verticals November 03, 2023 Ransomware operators and APT groups often target organizations in the industrials vertical. Learn why in our blog. See Details Blog Pagination Current page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Next page Next › Last page Last » Introducing Source Zero Our new technical cybersecurity thought leadership resource, Source Zero, focuses on red and blue team security capabilities, objective tools analysis, and more.
Image Bridging the Human Gap in Vulnerability Management February 23, 2024 How can security practitioners break down communication siloes and narrow skills gaps? Learn more from a vulnerability management practice manager. See Details Blog
Image Vertical Target Series: Technology, Telecommunications and Academic and Educational Services February 08, 2024 Technology companies and universities have increasingly become victims to ransomware attacks and other cybercriminal activity. Learn the latest. See Details Blog
Image Navigating the Digital Landscape of Vulnerability Management February 07, 2024 How do you rationalize security tools and enhance solutions in vulnerability management? Optiv shares strategies for enhancing a VM program. See Details Blog
Image Securing API Dependencies January 30, 2024 It is important to secure dependencies that can ultimately impact APIs and you as the owner. Read Optiv's guidance on tools for reviewing your SBOM.... See Details Blog
Image Managing Perspectives for Assessment Reports with Few or Zero Findings January 26, 2024 When discussing an assessment report with zero findings, you can transform skepticism into a commitment to continuous improvement. Read how to do this.... See Details Blog
Image Optiv’s gTIC Prioritized Software and Services List + MITRE Tactics Part IV: Microsoft Software and Products January 11, 2024 Optiv's Global Threat Intelligence Center (gTIC) highlights key vulnerabilities and threats impacting prioritized software and services. See Details Blog
Image Vulnerability Management Program Fundamentals December 13, 2023 Building a vulnerability management (VM) program involves strategizing on policy, team organization and metrics. Learn how to strengthen a VM program. See Details Blog
Image Optiv’s gTIC Prioritized Software and Services List + MITRE Tactics Part V: VMware Software and Products December 12, 2023 Adversaries exploit flaws in VMware software to gain initial access, achieve persistence and more. Read about these threats and techniques. See Details Blog
Image Investigating an Adversary-in-the-Middle (AiTM) Phishing Email December 11, 2023 How do adversaries leverage QR codes to bypass MFA controls in phishing attacks? Learn more from red and blue teamer perspectives. See Details Blog
Image gTIC Prioritized List + MITRE Tactics November 29, 2023 Optiv's® Global Threat Intelligence Center (gTIC) observed, collected, and analyzed multiple data points and information derived from Optiv's own.... See Details Blog
Image Redirectors: A Red Teamer’s Introduction November 20, 2023 Redirectors can enable operators to restrict and control the flow of traffic to C2 servers. Learn the use cases and implementation of redirectors. See Details Blog
Image Vertical Target Series: Industrials and Industrial Sub-Verticals November 03, 2023 Ransomware operators and APT groups often target organizations in the industrials vertical. Learn why in our blog. See Details Blog