Skip to main content
home
Contact
Search
HOW CAN WE HELP?

Let us know what you need, and we will have an Optiv professional contact you shortly.

General Inquiries
800-574-0896
info@optiv.com

Incident Response
(888) 732-9407

Invoicing Requests
invoicing@optiv.com

Copy the Below Link To Your RSS Reader

Main navigation

  • Security Solutions
    • Cyber Digital Transformation
      • Analytics and Big Data
      • Cloud Security Solutions
      • Cybersecurity Orchestration and Automation
      • Product Security Services
    • Cybersecurity Maturity Model Certification (CMMC)
    • Identity and Data Management
      • Digital Access Management
      • Identity Governance and Administration
      • Data Governance and Protection
    • Optiv Federal
    • Risk Management and Transformation
      • Cyber Resilience
      • Privacy and Governance
      • Risk Optimization
    • Security Operations
      • Advanced Fusion Center Operations
      • Cyber Authorized Support Services
      • Cyber-as-a-Service
      • Intelligence Operations
      • Managed Detection and Response Services
      • Managed Security Services
    • Security Services
      • Application Security
      • Architecture and Implementation
      • Attack and Penetration
      • Canadian Operations
      • Cybersecurity Education
      • GDPR
      • Software Assurance-as-a-Service
      • Security Program Strategy
      • ThreatDNA and ThreatBEAT
    • Security Technology
      • Application Security Technology
      • Cloud Security Technology
      • Data Security Technology
      • Endpoint Security Technology
      • Identity and Access Management Technology
      • Network Security Technology
      • Security Operations Solutions Technology
    • Threat Management
      • Attack and Penetration
  • Partner Directory
  • Explore Optiv Insights
    • Blog
    • CISO Periodic Table
    • Cybersecurity Dictionary
    • Downloads
    • Press Releases
    • Source Zero
    • Videos
  • Our Story
    • Client Success Stories
    • Events
    • Leadership
    • Locations
    • News and Awards
  • Join the Team
    • Careers
    • Resources
  • Client Portal
Image
security_of_collaboration_tools_list_476x210

Optiv’s REST API “Goat”

July 10, 2020

Optiv is releasing REST API Goat, a vulnerable API, to help boost AppSec skills.

See Details

Blog

Image
quick_tips_appsec_3_list_476x210

Quick Tips for Building an Effective AppSec Program – Part 3

June 06, 2018

This is the last post in my series on creating an effective AppSec program within your organization. In my last post, we discussed the importance of....

See Details

Blog

Image
SmokeTest_3_list_476x210

Observations on Smoke Tests – Part 3

May 09, 2018

While attending one of our technology partner’s security training courses, the instructor presented on their product’s various features and....

See Details

Blog

Image
quick_tips_appsec_2_list_476x210

Quick Tips for Building an Effective AppSec Program – Part 2

May 01, 2018

In my last blog post, I talked about what an application security (AppSec) program is and how an organization would go about building a formal program....

See Details

Blog

Image
five_application_security_list_476x210

Five Application Security Best Practices for Serverless Applications

April 24, 2018

Serverless architecture enables applications to be developed and deployed without management of the underlying host or operating system. Instead of a....

See Details

Blog

Image
quick_tips1_list_476x210

Quick Tips for Building an Effective AppSec Program – Part 1

April 10, 2018

An application security (AppSec) program can be defined as the set of risk mitigating controls and business functions that support the discovery....

See Details

Blog

Image
gen_blog_list_item

Secure SDLC Lessons Learned: #5 Personnel

April 19, 2017

t’s no secret that finding and retaining dependable, well-trained application security professionals is a serious challenge, and has been for years....

See Details

Blog

Image
gen_blog_list_item

Secure SDLC Lessons Learned: #4 Metrics

April 13, 2017

As the secure SDLC program matures, vulnerabilities should be caught and remediated earlier in the lifecycle. To know if the program is truly working....

See Details

Blog

Image
gen_blog_list_item

Secure SDLC Lessons Learned: #3 Knowledge Management

April 04, 2017

The term “knowledge management” (KM) refers to using vulnerability mining to turn remediation into lessons learned. Essentially this involves taking....

See Details

Blog

Image
gen_blog_list_item

Secure SDLC Lessons Learned: #2 Assessment Toolchain

March 21, 2017

Most organizations would agree that maintaining a fast, predictable flow of planned work (e.g. projects, scheduled changes) that achieves business....

See Details

Blog

Image
gen_blog_list_item

Secure SDLC Lessons Learned: #1 Application Catalog

March 13, 2017

Building an application catalog is a critical step towards maintaining governance over a secure SDLC program. The primary purposes of the catalog are....

See Details

Blog

Image
gen_blog_list_item

Integrating Dynamic Testing Tools into the Development Process

April 26, 2016

The creation and integration of a secure development lifecycle (SDLC) can be an intimidating, even overwhelming, task. There are so many aspects that....

See Details

Blog

Footer menu

  • Security Solutions
  • Partner Directory
  • Explore Optiv Insights
  • Our Story
  • Join Optiv Team
  • Client Portal

 

 

Home | Contact | Cookie Policy | Privacy Policy | Terms of Use | Sitemap

 

The content provided is for informational purposes only. Links to third party sites are provided for your convenience and do not constitute an endorsement. These sites may not have the same privacy, security or accessibility standards.

 

© 2020 – 2021. Optiv Security Inc. All Rights Reserved.