What Can We Help You Find?

October 29, 2017
The United States Department of Homeland Security identifies 16 critical infrastructure sectors whose assets, systems and networks—whether physical or....
Blog

October 25, 2017
The Children’s Internet Usage Study conducted by the Center for Cyber Safety and Education discovered that 30 percent of children ages 8-14 use the....
Blog

October 24, 2017
The General Data Protection Regulation (GDPR) is a new regulation affecting organizations that reside in the European Union (EU) or merely transmit EU....
Blog

October 23, 2017
On Monday, October 16, researchers announced the discovery of several vulnerabilities within the wireless protocol WPA and WPA2. The details of these....
Blog

October 22, 2017
2017 has been a very busy year for cybersecurity professionals. It seems weekly, if not daily, news breaks of a new data breach or intrusion of....
Blog

October 18, 2017
The most widely known requirements in PCI DSS 3.2 section 11 with a timing implication are the quarterly external and internal vulnerability scans (11....
Blog

October 17, 2017
Criminals oftentimes utilize current events (natural disasters, large data breaches, public massacres, terrorist attacks, etc.) to target not just the....
Blog

October 17, 2017
DENVER – October 17, 2017 – Optiv Security today announced a unique, programmatic approach that distills the complex European Union (EU) General Data...
Press Release

October 16, 2017
Currently, an estimated 6.4 billion Internet-of-Things (IoT) devices are connected, with 67 percent residing in North America, Western Europe and....
Blog

October 12, 2017
October is National Cybersecurity Awareness Month; the annual campaign led by the U.S. Department of Homeland Security that seeks to raise awareness....
Blog

October 11, 2017
Optiv is a market-leading provider of end-to-end cyber security solutions. View our services here.
Download

October 10, 2017
Key steps to cybersecurity in the workplace include establishing and maintaining a “security culture” in which company networks and the data they hold....
Blog