Image
SZ_Hacker-Falling-Code_476x210_Red

September 01, 2022

Do you think that simple tools like Gaussian blurs can safely redact sensitive content in your online images? See Optiv's solution to the....

Blog

Image
Russia-ukraine-blog-list-image.jpg

August 25, 2022

As cyber warfare from the Russia – Ukraine conflict continues, Optiv’s gTIC provides information on timely events and what to expect looking forward.

Blog

Image
guide-to-edr-list.jpg

August 19, 2022

Infrastructure as Code (IaC) is an efficient and secure way to spin up infrastructure. But It's important to scan IaC templates for errors prior to....

Blog

Image
Partner-Netskope_Redefining-SASE-Blog-website-list-image.jpg

July 29, 2022

Threats to your security are malicious and persistent. Rubrik's guide is an overview on how to understand and implement risk protections.

Blog

Image
Partner-Varonis-WhatsInYourCloud-Blog-website-list-image.jpg

July 28, 2022

Varonis DatAdvantage Cloud (DAC) ensures proper visibility into your cloud SaaS footprint. Optiv's assessments take DAC to the next level. Schedule....

Blog

Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?