Image
Answering_Key_Questions_List Image 476x210.jpg

October 12, 2023

The demand for advanced cybersecurity solutions is becoming critical. Artificial intelligence (AI) has emerged as a powerful contender to help solve....

Blog

Image
Cloud Network Security Architecture Review_List Image 476x210.jpg

October 06, 2023

With the increased migration from on-premises to cloud environments, a cloud security network architecture review can help you solve key....

Blog

Image
Corporate_CPPA-Draft-Cybersecurity-Regulations_list-image-476x210.png

October 05, 2023

The California Privacy Protection Agency (CPPA) drafted regulations that may impose major cybersecurity requirements. Learn the latest.

Blog

Image
Technical_Googles-proposed-TLS_list-image-476x210.jpg

October 05, 2023

Google is reducing the TLS certificate lifespan. Prepare for this industry shift with Certificate Lifecycle Management (CLM) software.

Blog

Image
CAM23_Week 2_NACD-tech-rat_list-image-476x210.jpg

October 04, 2023

Discover how to do more with less through security tool rationalization.

Blog

Image
CAM23_wk2-max-effect_list-image-476x210.jpg

October 03, 2023

Optiv subject matter experts discuss rationalizing technology to maximize effectiveness in uncertain economic times.

Blog

Image
SZ_Coding-Linux_476x210.jpg

October 03, 2023

Understanding API usage and profiles is key for an organization’s security maturity. Learn how to classify API usage, exposure, data and compliance.

Blog

Image
everything-everywhere-all-at-once-ir-tanium-list-image-476x210.jpg

September 28, 2023

Today’s IT ops and security teams too often find themselves in an uphill battle. Resilience and an effective incident response plan are key to....

Blog

Image
CAM23_Week-1_protect-bus_list-image-476x210.jpg

September 27, 2023

Your data is your most valuable asset. Protect your business from insider threats with these cyber-smart behaviors for Cybersecurity Awareness Month.

Blog

Image
SZ_Software-development_476x210_Red.jpg

September 26, 2023

Software operations are a key part of determining software system security. Learn to leverage OWASP SAMM to maintain the security of deployed software....

Blog

Image
Parter_SEC-rules-VMWare_list-image-476x210.jpg

September 21, 2023

The SEC’s new rules for cybersecurity is designed to provide transparency of cyber risk for investors and shareholders. Companies will need to rethink....

Blog

Image
SZ_SEC~2.JPG

September 20, 2023

Optiv's Global Threat Intelligence Center (gTIC) breaks down the latest critical vulnerabilities that your security teams should be aware of.

Blog