Want to unlock your data power – but keep it locked? Learn how Optiv Data Protection services can help you manage the movement of data on- or offline...
July 20, 2021
Zero Trust security is a new way to architect your cybersecurity strategy. Read to learn about how to set up Zero Trust Security for your network.
September 30, 2020
Hackers can use the username structure and deployed technologies in an online document’s metadata to successfully breach the perimeter.
August 18, 2020
Forcepoint’s Romeo Gain outlines how to build an effective data protection action plan.
November 13, 2019
Rather than building programs for individual jurisdictions, organizations should develop holistic programs that address the overarching commonalities.
May 30, 2018
Learn who to draft for the General Data Protection Regulation (GDPR) season.
December 14, 2017
Learn about the top 20 CIS Critical Security Controls (CSC) through the eyes of a hacker.
October 30, 2017
In this second part of the series, we will discuss Optiv’s Six Information Security Pillars for GDPR compliance. For the information security....