A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Image Will Blockchain Change the World? (Part 2) October 30, 2018 In the previous post of this two-part series, we introduced the concept of blockchain and its possible use cases. Blockchain innovation promises.... See Details Blog
Image Will Blockchain Change the World? October 23, 2018 There has been a lot of hype around “blockchain” these past few months. After attending sessions, discussing it with others, and researching how it is.... See Details Blog
Image Phishing - The Rest of the Story May 29, 2018 Receiving an email lure designed to trick you into clicking a phishing link and then logging into a fake website has become a common threat. In this.... See Details Blog
Image Pass-the-Hash March 14, 2018 Pass-the-hash (PtH) is an all too common form of credentials attack, especially since the advent of a tool called Mimikatz. Using PtH to extract from.... See Details Blog
Image Cyber Threat Intelligence Requires Commitment December 12, 2017 It’s been said that in a breakfast of bacon and eggs, the chicken is involved but the pig is committed. This saying is relevant when implementing a.... See Details Blog
Image Orchestration & Automation (O&A) Methodology November 02, 2017 O&A is at the heart of working with big data in an automated and efficient fashion. It involves two important elements: orchestration - planning and.... See Details Blog
Image Being Certain about Estimative Uncertainty September 26, 2017 I love it when my teenager says something like, “You know Dad, that’s how they designed it,” when in fact, my child does not have any evidence to.... See Details Blog
Image The Need for Augmented Intelligence September 07, 2017 Cyber threat intelligence can be a lot harder than you think. As a regular speaker at various conferences, I’m constantly asked the question about how.... See Details Blog
Image Indicators of Compromise (IOCs) are Not Intelligence July 05, 2017 When discussing the topic of cyber threat intelligence, I frequently hear questions about Indicators of Compromise (IOCs). IOCs are not intelligence.... See Details Blog
Image Cyber Threat Intelligence – Putting out Fires or Firefighting? June 19, 2017 When it comes to fighting malware, combating nation-state threats, and securing digital assets, the information security industry has much to learn.... See Details Blog
Image Risk Management and Intelligence: What is Your End Game? May 30, 2017 Anyone worth their salt in the world of cyber threat intelligence is always focused on the actionable outcome – how can I lower my business risk by.... See Details Blog
Image Shedding Light on the Dark Web – What is it, Really, and How Can it Help Me? May 03, 2017 Dark web, darknet, deep web – all sexy new terms that are often overused and not well understood. Definitions are all over the place ranging from.... See Details Blog
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?