A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image State of Ransomware 2022: First Half Review and Predictions September 07, 2022 The state of ransomware 2022. First half review on the Optiv blog. Major threat actors, high-profile victims and predictions of what might lie ahead. See Details Blog Image Insider Threats: The Risk Right Under Your Nose September 06, 2022 Insider threats are hard to detect since the focus tends to be outward. Discover the main actors along with detection and prevention policies on the.... See Details Blog Image Solving the Unredacter Challenge September 01, 2022 Do you think that simple tools like Gaussian blurs can safely redact sensitive content in your online images? See Optiv's solution to the.... See Details Blog Image It’s Time to Move Toward the Autonomous SOC August 31, 2022 Autonomous Security Operations Center are needed to deliver positive security outcomes. Give your team full visility to respond to threats quickly. See Details Blog Image Russia/Ukraine Update - August 2022 August 25, 2022 As cyber warfare from the Russia – Ukraine conflict continues, Optiv’s gTIC provides information on timely events and what to expect looking forward. See Details Blog Image Guide To EDR, NDR, XDR and SIEM August 19, 2022 Infrastructure as Code (IaC) is an efficient and secure way to spin up infrastructure. But It's important to scan IaC templates for errors prior to.... See Details Blog Image Integrated Threat Management: Activities to Boost Your Security Posture August 18, 2022 This post illustrates how the integration of multiple threat management activities can be incorporated into a comprehensive risk strategy. See Details Blog Image Deploying IaC Securely, and the Risks of an Insecure Template August 05, 2022 Infrastructure as Code (IaC) is an efficient and secure way to spin up infrastructure. But It's important to scan IaC templates for errors prior to.... See Details Blog Image The Ripples of Executive Order 14028: 5 Questions Your Board Should Be Asking Now August 03, 2022 EO 14028 seeks to ensure American critical infrastructure is protected with robust cybersecurity practices. Is your board prepared? See Details Blog Image 2022 Cybersecurity & Resilience Guide August 01, 2022 Threats to your security are malicious and persistent. Rubrik's guide is an overview on how to understand and implement risk protections. See Details Blog Image Redefinition of SASE July 29, 2022 Threats to your security are malicious and persistent. Rubrik's guide is an overview on how to understand and implement risk protections. See Details Blog Image What’s In Your Cloud? July 28, 2022 Varonis DatAdvantage Cloud (DAC) ensures proper visibility into your cloud SaaS footprint. Optiv's assessments take DAC to the next level. Schedule.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 15 Page 16 Page 17 Page 18 Current page 19 Page 20 Page 21 Page 22 Page 23 … Next page Next › Last page Last »
Image State of Ransomware 2022: First Half Review and Predictions September 07, 2022 The state of ransomware 2022. First half review on the Optiv blog. Major threat actors, high-profile victims and predictions of what might lie ahead. See Details Blog
Image Insider Threats: The Risk Right Under Your Nose September 06, 2022 Insider threats are hard to detect since the focus tends to be outward. Discover the main actors along with detection and prevention policies on the.... See Details Blog
Image Solving the Unredacter Challenge September 01, 2022 Do you think that simple tools like Gaussian blurs can safely redact sensitive content in your online images? See Optiv's solution to the.... See Details Blog
Image It’s Time to Move Toward the Autonomous SOC August 31, 2022 Autonomous Security Operations Center are needed to deliver positive security outcomes. Give your team full visility to respond to threats quickly. See Details Blog
Image Russia/Ukraine Update - August 2022 August 25, 2022 As cyber warfare from the Russia – Ukraine conflict continues, Optiv’s gTIC provides information on timely events and what to expect looking forward. See Details Blog
Image Guide To EDR, NDR, XDR and SIEM August 19, 2022 Infrastructure as Code (IaC) is an efficient and secure way to spin up infrastructure. But It's important to scan IaC templates for errors prior to.... See Details Blog
Image Integrated Threat Management: Activities to Boost Your Security Posture August 18, 2022 This post illustrates how the integration of multiple threat management activities can be incorporated into a comprehensive risk strategy. See Details Blog
Image Deploying IaC Securely, and the Risks of an Insecure Template August 05, 2022 Infrastructure as Code (IaC) is an efficient and secure way to spin up infrastructure. But It's important to scan IaC templates for errors prior to.... See Details Blog
Image The Ripples of Executive Order 14028: 5 Questions Your Board Should Be Asking Now August 03, 2022 EO 14028 seeks to ensure American critical infrastructure is protected with robust cybersecurity practices. Is your board prepared? See Details Blog
Image 2022 Cybersecurity & Resilience Guide August 01, 2022 Threats to your security are malicious and persistent. Rubrik's guide is an overview on how to understand and implement risk protections. See Details Blog
Image Redefinition of SASE July 29, 2022 Threats to your security are malicious and persistent. Rubrik's guide is an overview on how to understand and implement risk protections. See Details Blog
Image What’s In Your Cloud? July 28, 2022 Varonis DatAdvantage Cloud (DAC) ensures proper visibility into your cloud SaaS footprint. Optiv's assessments take DAC to the next level. Schedule.... See Details Blog
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?