A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Advanced Persistent Threat (APT) Groups: Boogeyman or Well-Funded Cybercriminal? October 17, 2022 Advanced Persistent Threat Groups are an insidious class of hackers. They have an agenda and are willing to wait, often a long time, before striking.... See Details Blog Image Secure Your Password October 17, 2022 Good password hygiene is a vital security practice. Learn password best practices and other security tips during CAM 2022 from Optiv. See Details Blog Image Secure Your Talent September 28, 2022 This post covers simple yet effective strategies to help you secure the talent you have, the talent you may need as well as securing your supply chain.... See Details Blog Image Sacrificing Suspended Processes September 23, 2022 EDR hooking has become a major part of an adversary’s ability to successfully compromise an endpoint system. Hooking is a technique that alters the.... See Details Blog Image Considerations For Uncertain Economic Times: Spending Strategies and Staff Review September 19, 2022 In this article, an Optiv engineering fellow discusses spending types as well as methods for reviewing staffing needs and team member efficiency. See Details Blog Image SecOps Best Practices: Evolve Cyber Recovery to Shore Up Security Operations September 19, 2022 Enhance your SecOps program's response and recovery component with Optiv's CRS, which is critical amid an increasingly uncertain threat landscape. See Details Blog Image Digital Supply Chain Security From the Ground Up September 13, 2022 Digital Supply Chain Security is critical due to open source code and multiple vendors in software supply chains. Know what you have and how to secure.... See Details Blog Image AIOPS From Palo Alto Networks September 08, 2022 Artificial Intelligence for IT Operations (AIOPS) from Palo Alto Networks is simply the smarter security choice. Gain insights while achieving a.... See Details Blog Image State of Ransomware 2022: First Half Review and Predictions September 07, 2022 The state of ransomware 2022. First half review on the Optiv blog. Major threat actors, high-profile victims and predictions of what might lie ahead. See Details Blog Image Insider Threats: The Risk Right Under Your Nose September 06, 2022 Insider threats are hard to detect since the focus tends to be outward. Discover the main actors along with detection and prevention policies on the.... See Details Blog Image Solving the Unredacter Challenge September 01, 2022 Do you think that simple tools like Gaussian blurs can safely redact sensitive content in your online images? See Optiv's solution to the.... See Details Blog Image It’s Time to Move Toward the Autonomous SOC August 31, 2022 Autonomous Security Operations Center are needed to deliver positive security outcomes. Give your team full visility to respond to threats quickly. See Details Blog Pagination First page « First Previous page ‹ Previous … Page 14 Page 15 Page 16 Page 17 Current page 18 Page 19 Page 20 Page 21 Page 22 … Next page Next › Last page Last »
Image Advanced Persistent Threat (APT) Groups: Boogeyman or Well-Funded Cybercriminal? October 17, 2022 Advanced Persistent Threat Groups are an insidious class of hackers. They have an agenda and are willing to wait, often a long time, before striking.... See Details Blog
Image Secure Your Password October 17, 2022 Good password hygiene is a vital security practice. Learn password best practices and other security tips during CAM 2022 from Optiv. See Details Blog
Image Secure Your Talent September 28, 2022 This post covers simple yet effective strategies to help you secure the talent you have, the talent you may need as well as securing your supply chain.... See Details Blog
Image Sacrificing Suspended Processes September 23, 2022 EDR hooking has become a major part of an adversary’s ability to successfully compromise an endpoint system. Hooking is a technique that alters the.... See Details Blog
Image Considerations For Uncertain Economic Times: Spending Strategies and Staff Review September 19, 2022 In this article, an Optiv engineering fellow discusses spending types as well as methods for reviewing staffing needs and team member efficiency. See Details Blog
Image SecOps Best Practices: Evolve Cyber Recovery to Shore Up Security Operations September 19, 2022 Enhance your SecOps program's response and recovery component with Optiv's CRS, which is critical amid an increasingly uncertain threat landscape. See Details Blog
Image Digital Supply Chain Security From the Ground Up September 13, 2022 Digital Supply Chain Security is critical due to open source code and multiple vendors in software supply chains. Know what you have and how to secure.... See Details Blog
Image AIOPS From Palo Alto Networks September 08, 2022 Artificial Intelligence for IT Operations (AIOPS) from Palo Alto Networks is simply the smarter security choice. Gain insights while achieving a.... See Details Blog
Image State of Ransomware 2022: First Half Review and Predictions September 07, 2022 The state of ransomware 2022. First half review on the Optiv blog. Major threat actors, high-profile victims and predictions of what might lie ahead. See Details Blog
Image Insider Threats: The Risk Right Under Your Nose September 06, 2022 Insider threats are hard to detect since the focus tends to be outward. Discover the main actors along with detection and prevention policies on the.... See Details Blog
Image Solving the Unredacter Challenge September 01, 2022 Do you think that simple tools like Gaussian blurs can safely redact sensitive content in your online images? See Optiv's solution to the.... See Details Blog
Image It’s Time to Move Toward the Autonomous SOC August 31, 2022 Autonomous Security Operations Center are needed to deliver positive security outcomes. Give your team full visility to respond to threats quickly. See Details Blog