A Single Partner for Everything You Need With more than 450 technology partners in its ecosystem, Optiv provides clients with best-in-class security technology and solutions that equip organizations to detect and manage cyber threats effectively and efficiently in today's growing attack surface. Optiv's Partner of the Year Awards recognize forward-thinking innovation, performance and growth, and unparalleled technology solutions.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Showing 1 - 12 of 797 results Search Terms Topic of Interest Topic of InterestAppSecArchitecture and ImplementationArtificial Intelligence (AI)BenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersecurity SimplifiedCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By Sort by LatestSort by Oldest Image Blog Kerberos - A Domains Achilles' Heel December 12, 2025 Optiv highlights the attack strategy of using forged Kerberos tickets to compromise a domain, and provides ways to defend against it. Read the Blog Image Blog AI in Cybersecurity: What Works, New Risks and How to Stay Safe December 12, 2025 AI boosts cyber efficiency but introduces new risks. Learn how to use AI safely and protect your data with smart, practical guardrails. Read the Blog Image Blog 2025 Industry Threat Profile December 09, 2025 Stay ahead of threat actors and compliance pressures and make proactive security decisions with Optiv's 2025 Industry Threat Profile. Read the Blog Image Blog Using AI Securely December 09, 2025 Discover how to use AI tools securely—learn about key risks, privacy and best practices to protect your data and work smarter with AI. Read the Blog Image Blog Cybersecurity Is the Gift Customers Really Want November 24, 2025 When a brand protects customers during its busiest weeks, it sends a powerful signal about readiness and care. Read the Blog Image Blog Building Trust in AI: A Guide for Secure and Confident Adoption November 21, 2025 Explore how to build trust in AI across your organization with strategies for security, literacy, and risk management, empowering confident adoption. Read the Blog Image Blog Threat Modeling of AI Applications Is Mandatory November 21, 2025 Discover why threat modeling is essential for secure AI applications and how the MAESTRO framework addresses unique risks in modern AI systems. Read the Blog Image Blog The Future of Secure AI: Balancing Innovation and Risk November 18, 2025 AI is reshaping cybersecurity, balancing innovation with risk. Learn strategies for scalable, ethical and secure AI adoption in your organization. Read the Blog Image Blog The Board’s Playbook for Navigating AI Policy November 05, 2025 As companies adopt new tools to drive growth, boards should ensure AI policy aligns with organizational goals and values. Read the Blog Image Blog The Role of Asset Management in Vulnerability Management October 31, 2025 Discover how effective asset management strengthens vulnerability management, reduces cyber risk and protects your organization’s IT infrastructure. Read the Blog Image Blog When Authenticity Becomes Ambiguous October 20, 2025 Authenticity has become the newest attack surface, and the most powerful competitive advantage. In the end, trust isn't built by technology, it's.... Read the Blog Image Blog Managing AI Risks in the Vendor Ecosystem October 17, 2025 Artificial Intelligence is revolutionizing the way organizations operate. Businesses are now increasingly looking at how they can integrate AI.... Read the Blog Pagination Current page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 … Next page Next › Last page Last » Subscribe to our newsletter for cutting-edge insights Subscribe
Image Blog Kerberos - A Domains Achilles' Heel December 12, 2025 Optiv highlights the attack strategy of using forged Kerberos tickets to compromise a domain, and provides ways to defend against it.
Image Blog AI in Cybersecurity: What Works, New Risks and How to Stay Safe December 12, 2025 AI boosts cyber efficiency but introduces new risks. Learn how to use AI safely and protect your data with smart, practical guardrails.
Image Blog 2025 Industry Threat Profile December 09, 2025 Stay ahead of threat actors and compliance pressures and make proactive security decisions with Optiv's 2025 Industry Threat Profile.
Image Blog Using AI Securely December 09, 2025 Discover how to use AI tools securely—learn about key risks, privacy and best practices to protect your data and work smarter with AI.
Image Blog Cybersecurity Is the Gift Customers Really Want November 24, 2025 When a brand protects customers during its busiest weeks, it sends a powerful signal about readiness and care.
Image Blog Building Trust in AI: A Guide for Secure and Confident Adoption November 21, 2025 Explore how to build trust in AI across your organization with strategies for security, literacy, and risk management, empowering confident adoption.
Image Blog Threat Modeling of AI Applications Is Mandatory November 21, 2025 Discover why threat modeling is essential for secure AI applications and how the MAESTRO framework addresses unique risks in modern AI systems.
Image Blog The Future of Secure AI: Balancing Innovation and Risk November 18, 2025 AI is reshaping cybersecurity, balancing innovation with risk. Learn strategies for scalable, ethical and secure AI adoption in your organization.
Image Blog The Board’s Playbook for Navigating AI Policy November 05, 2025 As companies adopt new tools to drive growth, boards should ensure AI policy aligns with organizational goals and values.
Image Blog The Role of Asset Management in Vulnerability Management October 31, 2025 Discover how effective asset management strengthens vulnerability management, reduces cyber risk and protects your organization’s IT infrastructure.
Image Blog When Authenticity Becomes Ambiguous October 20, 2025 Authenticity has become the newest attack surface, and the most powerful competitive advantage. In the end, trust isn't built by technology, it's....
Image Blog Managing AI Risks in the Vendor Ecosystem October 17, 2025 Artificial Intelligence is revolutionizing the way organizations operate. Businesses are now increasingly looking at how they can integrate AI....