Skip to main content
Sort By:

IDC MarketScape: U.S. Emerging Managed Security Services 2019 Vendor Assessment Project

IDC recommends that companies undertake a holistic, enterprise-wide security posture that is proactive and predictive.

See Details

IaaS Security - AWS Native and Third-Party Tools Executive Summary

This paper helps AWS users with Amazon, Palo Alto Networks and Tenable cloud infrastructure assessment tools.

See Details

CloudFormation Templates: What’s in that Stack?

In this blog we show an example of a basic formation template attack. It’s opportunistic and it would be very hard to target a specific organization i...

See Details

CDX Orchestration and Automation Service Brief

Orchestrate and automate technologies, processes and people to run a successful IT and security operation.

See Details

IaaS Security - AWS Native and Third-Party Tools

Many tools are available to assist customers responsible for their own “security in the cloud.”

See Details

CDX Analytics and Big Data Service Brief

Get real-time value extraction from secured data.

See Details

Service Providers and PCI Compliance, Part 3 – Remediating Missing Due Diligence

Part three of this series addressing an organization's PCI-DSS compliance obligations when they use cloud services (IAAS, PAAS, or SAAS). Part two con...

See Details

Cloud Security Service Brief

Enable secure and efficient cloud adoption with accelerated time to value.

See Details

Personal Security Habits – Looking Inward

Every individual’s awareness and behavior contribute to an organization’s security. While routine awareness training may seem remedial to many of us, ...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cyber security Events in your area.