A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image GDPR Part 3: GDPR and the Information Security Program November 06, 2017 In this third and final part of the series, we’ll spend some time bringing GDPR and its various requirements back into the information security.... See Details Blog Image Using Micro-Segmentation to Protect Your Data – Part 1 November 05, 2017 As software-defined networking (SDN) technologies have become more prevalent and organizational perimeters have become blurred, micro-segmentation is.... See Details Blog Image Orchestration & Automation (O&A) Methodology November 02, 2017 O&A is at the heart of working with big data in an automated and efficient fashion. It involves two important elements: orchestration - planning and.... See Details Blog Image A Day in the Life of Optiv Cyber Security Superheroes: Luke Papineau November 01, 2017 “There are too many vendors…selling too many products!” This outcry is what our client managers hear too many times in the field. Today's.... See Details Blog Image GDPR Part 2: The Six Information Security Pillars October 30, 2017 In this second part of the series, we will discuss Optiv’s Six Information Security Pillars for GDPR compliance. For the information security.... See Details Blog Image Critical Infrastructure Security October 29, 2017 The United States Department of Homeland Security identifies 16 critical infrastructure sectors whose assets, systems and networks—whether physical or.... See Details Blog Image Help Keep Your Children Safe Online October 25, 2017 The Children’s Internet Usage Study conducted by the Center for Cyber Safety and Education discovered that 30 percent of children ages 8-14 use the.... See Details Blog Image GDPR Part 1: A Legal, IT, or Information Security Issue? October 24, 2017 The General Data Protection Regulation (GDPR) is a new regulation affecting organizations that reside in the European Union (EU) or merely transmit EU.... See Details Blog Image KRACK - What you need to know about Key Reinstallation AttaCKs October 23, 2017 On Monday, October 16, researchers announced the discovery of several vulnerabilities within the wireless protocol WPA and WPA2. The details of these.... See Details Blog Image Cybersecurity Careers October 22, 2017 2017 has been a very busy year for cybersecurity professionals. It seems weekly, if not daily, news breaks of a new data breach or intrusion of.... See Details Blog Image PCI Compliance Every Day – Requirement 11 October 18, 2017 The most widely known requirements in PCI DSS 3.2 section 11 with a timing implication are the quarterly external and internal vulnerability scans (11.... See Details Blog Image Criminals Often Prey on Victims… Know the Top 5 Things to Protect Yourself October 17, 2017 Criminals oftentimes utilize current events (natural disasters, large data breaches, public massacres, terrorist attacks, etc.) to target not just the.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 46 Page 47 Page 48 Page 49 Current page 50 Page 51 Page 52 Page 53 Page 54 … Next page Next › Last page Last »
Image GDPR Part 3: GDPR and the Information Security Program November 06, 2017 In this third and final part of the series, we’ll spend some time bringing GDPR and its various requirements back into the information security.... See Details Blog
Image Using Micro-Segmentation to Protect Your Data – Part 1 November 05, 2017 As software-defined networking (SDN) technologies have become more prevalent and organizational perimeters have become blurred, micro-segmentation is.... See Details Blog
Image Orchestration & Automation (O&A) Methodology November 02, 2017 O&A is at the heart of working with big data in an automated and efficient fashion. It involves two important elements: orchestration - planning and.... See Details Blog
Image A Day in the Life of Optiv Cyber Security Superheroes: Luke Papineau November 01, 2017 “There are too many vendors…selling too many products!” This outcry is what our client managers hear too many times in the field. Today's.... See Details Blog
Image GDPR Part 2: The Six Information Security Pillars October 30, 2017 In this second part of the series, we will discuss Optiv’s Six Information Security Pillars for GDPR compliance. For the information security.... See Details Blog
Image Critical Infrastructure Security October 29, 2017 The United States Department of Homeland Security identifies 16 critical infrastructure sectors whose assets, systems and networks—whether physical or.... See Details Blog
Image Help Keep Your Children Safe Online October 25, 2017 The Children’s Internet Usage Study conducted by the Center for Cyber Safety and Education discovered that 30 percent of children ages 8-14 use the.... See Details Blog
Image GDPR Part 1: A Legal, IT, or Information Security Issue? October 24, 2017 The General Data Protection Regulation (GDPR) is a new regulation affecting organizations that reside in the European Union (EU) or merely transmit EU.... See Details Blog
Image KRACK - What you need to know about Key Reinstallation AttaCKs October 23, 2017 On Monday, October 16, researchers announced the discovery of several vulnerabilities within the wireless protocol WPA and WPA2. The details of these.... See Details Blog
Image Cybersecurity Careers October 22, 2017 2017 has been a very busy year for cybersecurity professionals. It seems weekly, if not daily, news breaks of a new data breach or intrusion of.... See Details Blog
Image PCI Compliance Every Day – Requirement 11 October 18, 2017 The most widely known requirements in PCI DSS 3.2 section 11 with a timing implication are the quarterly external and internal vulnerability scans (11.... See Details Blog
Image Criminals Often Prey on Victims… Know the Top 5 Things to Protect Yourself October 17, 2017 Criminals oftentimes utilize current events (natural disasters, large data breaches, public massacres, terrorist attacks, etc.) to target not just the.... See Details Blog