Skip to main content
Contact
Search
HOW CAN WE HELP?

Let us know what you need, and we will have an Optiv professional contact you shortly.

General Inquiries
800-574-0896
info@optiv.com

Incident Response
(888) 732-9407

Invoicing Requests
invoicing@optiv.com

Copy the Below Link To Your RSS Reader

Main navigation

  • Security Solutions
    • Cyber Digital Transformation
      • Analytics and Big Data
      • Cloud Security Solutions
      • Cybersecurity Orchestration and Automation
      • Product Security Services
    • Cybersecurity Maturity Model Certification (CMMC)
    • Identity and Data Management
      • Digital Access Management
      • Identity Governance and Administration
      • Data Governance and Protection
    • Optiv Federal
    • Risk Management and Transformation
      • Cyber Resilience
      • Privacy and Governance
      • Risk Optimization
    • Security Operations
      • Advanced Fusion Center Operations
      • Cyber Authorized Support Services
      • Cyber-as-a-Service
      • Intelligence Operations
      • Managed Detection and Response Services
      • Managed Security Services
    • Security Services
      • Application Security
      • Architecture and Implementation
      • Attack and Penetration
      • Canadian Operations
      • Cybersecurity Education
      • GDPR
      • PCI Compliance Management and Consulting Services
      • Software Assurance-as-a-Service
      • Security Program Strategy
      • ThreatDNA and ThreatBEAT
    • Security Technology
      • Application Security Technology
      • Cloud Security Technology
      • Data Security Technology
      • Endpoint Security Technology
      • Identity and Access Management Technology
      • Network Security Technology
      • Security Operations Solutions Technology
    • Threat Management
      • Attack and Penetration
  • Partner Directory
  • Explore Optiv Insights
    • Blog
    • CISO Periodic Table
    • Cybersecurity Dictionary
    • Downloads
    • Press Releases
    • Source Zero
    • Videos
  • Our Story
    • Client Success Stories
    • Events
    • Leadership
    • Locations
    • News and Awards
    • Optiv Chips In
  • Join the Team
    • Careers
    • Resources
  • Client Portal
Image
negative_threat_modelzero_trus_list

Like Tears in Rain: A DeathHiddenTear Ransomware Breakdown

July 02, 2020

Here is current analysis insight and a YARA rule to help you detect HiddenTear ransomware variants.

See Details

Blog

Image
22-ways-to-protect-yourself-against-phishing-attacks_list_476x210

COVID-19: From the Mindset of the Attacker

April 24, 2020

We’ve seen lots of COVID-19-related work-from-home tips, but how has it affected the attacker?

See Details

Blog

Image
Blog_Threat_Nemty-ransomware_Website-list-476x210

Nemty Ransomware Deployed via Payment Service Phish

November 05, 2019

In late August, a new ransomware strain, Nemty, was distributed in the wild. It, coupled with a multitude of other ransomware threats in 2019, demands....

See Details

Blog

Image
CyberOps_NCSAM-Blog-3_list_476x210

Personal Security Habits – Looking Inward

October 04, 2019

Every individual’s awareness and behavior contribute to an organization’s security. While routine awareness training may seem remedial to many of us....

See Details

Blog

Image
keeping_whoville_Secure-Payment_list_476x210

Keeping Who-ville Cyber Secure This Holiday Season

November 27, 2018

If we were to relate the Grinch to cyber security terms, we’d call him a quintessential threat actor. His sole focus is finding a way to stop....

See Details

Blog

Image
gen_blog_list_item

Predictions for Tomorrow’s Internet

October 15, 2017

Currently, an estimated 6.4 billion Internet-of-Things (IoT) devices are connected, with 67 percent residing in North America, Western Europe and....

See Details

Blog

Image
gen_blog_list_item

From the Boardroom to the Breakroom: Cybersecurity in the Workplace

October 10, 2017

Key steps to cybersecurity in the workplace include establishing and maintaining a “security culture” in which company networks and the data they hold....

See Details

Blog

Image
security_superheroes_list_476x210

A Day in the Life of Optiv Cyber Security Superheroes: Nick Hyatt

July 12, 2017

Nick always had an inquisitive mind. At a very young age, his father would watch as he sat at the family’s new TRS-80 microcomputer marveling at the....

See Details

Blog

Image
gen_blog_list_item

Update: Intelligence Advisory – Petya Outbreak

June 29, 2017

This is an update to the Intelligence Advisory: Petya Ransomware Outbreak - released June 27, 2017. Optiv’s Global Threat Intelligence Center (gTIC)....

See Details

Blog

Image
gen_blog_list_item

Petya / Petna / NotPetya Ransomware Recommendations from the Trenches

June 27, 2017

Here we go again. Not long ago I updated a blog post containing actionable recommendations to protect your environment from ransomware threats....

See Details

Blog

Image
gen_blog_list_item

Intelligence Advisory – New Petya Ransomware Outbreak

June 26, 2017

Optiv’s Global Threat Intelligence Center (gTIC) received reports from several sources concerning a recent modification to the Petya ransomware strain....

See Details

Blog

Image
gen_blog_list_item

What Changes will EO 13800 Bring to Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure?

June 21, 2017

Anyone who has held the position of CIO or CISO in a government agency or bureau can tell you implementing an effective information risk management....

See Details

Blog

Pagination

  • Current page 1
  • Page 2
  • Next page ››
  • Last page Last »

Footer menu

  • Security Solutions
  • Partner Directory
  • Explore Optiv Insights
  • Our Story
  • Join Optiv Team
  • Client Portal

 

 

Home | Contact | Cookie Policy | Privacy Policy | Terms of Use | Sitemap

 

The content provided is for informational purposes only. Links to third party sites are provided for your convenience and do not constitute an endorsement. These sites may not have the same privacy, security or accessibility standards.

 

© 2020 – 2021. Optiv Security Inc. All Rights Reserved.