Skip to main content
Sort By:

The Truths and Myths about Cybersecurity Risk

Debunk risk management myths in order to build a truly resilient cybersecurity program.

See Details

Features of a Threat Intelligence Platform

A Threat Intelligence Platform (TIP) is a fantastic way to manage intelligence and its process amongst individual teams and communities, including cli...

See Details

Top 5 Risk Management Mistakes (And How To Fix Them)

Learn not only about the top risk management mistakes businesses make today, but how to fix them.

See Details

Need a Risk Management Transformation?

Transition from traditional risk management to a modern approach to ensure cybersecurity risk and business risk are aligned.

See Details

Security in 2019: Getting Ahead of the Game

The year 2018 was not much different than recent years in the world of security: Several massive security incidents at large companies and government ...

See Details

RISKY BUSINESS: Solving Cyber Insecurity with a Risk-Centric Business Model

Optiv’s Risky Business white paper discusses how risk management needs to transform to become a fundamental component of overall business objectives....

See Details

It’s Not Always About the Perimeter – A Look at Domain Reconnaissance

In this information age, security threats are commonplace and can be devastating to a business. The ability to quickly and accurately detect cyber-thr...

See Details

IoC and IoA: Indicators of Intelligence

Intelligence seems to be full of three-letter acronyms, including Indicators of Compromise (IoC) and Indicators of Attack (IoA). The difference betwee...

See Details

Risk Management and Transformation: Cyber Resilience

Optiv’s Cyber Resilience services offers everything you need to become – and remain – vigilant about your cyber security.

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cyber security Events in your area.