The Optiv Attack Simulation prepares your purple team to detect, prevent and respond to attacks.
Identify people, process and technology that can accelerate your application security program with Optiv’s AppSec Program Strategy.
October 13, 2020
Application threat modeling decomposes application architecture into security-relevant components to reveal threats and potential risks.
April 23, 2020
This FAQ addresses privacy questions you may have about Apple and Google’s Covid-19 Contact Tracing solution.
August 09, 2019
To gain a competitive edge many organizations are adopting the latest technology, applications and services. However, this rapid adoption expands...
June 14, 2017
Learn how to keep pace with ransomware dealers and survive the ever-evolving ransomware threat.
April 03, 2017
At a recent conference, I heard a speaker say, “Medical diagnoses will be done completely without a human doctor in the future – computers will be....
February 16, 2017
“Actionability” is something we are starting to hear more and more from industry sales and marketing, but often doesn’t translate into reality for....
December 20, 2016
Cyber threat intelligence is a process required to make action-oriented, judgement-based decisions that are not otherwise possible. Optiv recommends....
January 13, 2016
Internet of Things (IoT) devices are entering the workplace at an astonishing rate, posing new risks to the enterprise.