A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Beyond the Buzz: Building Cyber Resilience July 25, 2022 This post by James Turgal discusses the importance of cyber resilience and how to build it across people, processes and technology. See Details Blog Image Finally, a Shift in Data Security Strategy Designed to Match the Real-World Threat Landscape July 20, 2022 In this blog post, Optiv partner Imperva outlines the function, benefits and "must haves" of a data security fabric solution. See Details Blog Image New SEC Cybersecurity Rules Focus on Board Accountability July 18, 2022 This post covers a proposed rule set from the SEC that will require cybersecurity disclosures within mandated annual and quarterly reporting. See Details Blog Image Cyber-Risk Quantification (CRQ): Lessons Learned July 18, 2022 Learn how to successfully implement cyber risk quantification from early adopters and industry surveys. See Details Blog Image Taking Your Zero Trust Strategy to the Endpoint July 11, 2022 Organizations need to create Zero Trust policies and ensure they have quality endpoint management. Tanium services supported by Optiv will help. See Details Blog Image Cyber Recovery Considerations: How to Keep the Lights On July 08, 2022 This post examines today's risky digital landscape and introduces a cyber recovery solution to help evolve traditional business continuity plans. See Details Blog Image Bi-Partisan U.S. Federal Privacy Bill Gains Momentum July 01, 2022 This post discusses ADPAA, a federal law focused on consumer privacy rights that's progressed to a bipartisan draft with traction in Congress. See Details Blog Image Russia/Ukraine Update - June 2022 June 30, 2022 Cyber attacks in the Russia-Ukraine conflict continue to mount. Get updates about WhisperGate, CaddyWiper and other exploits from Optiv's gTIC. See Details Blog Image ISMG Optiv Interview: Cyber Recovery Solution June 17, 2022 In this ISMG interview at RSAC 2022, Optiv’s Jessica Hetrick discusses the meaning of cyber recovery. See Details Blog Image ISMG Optiv Panel: Rationalizing Data Investments June 09, 2022 The more data you use, the more data you find you’ll need. This leads to hard decisions about what investments to make in data projects, technology.... See Details Blog Image Sigma Rule Translation and Automatic Queries May 26, 2022 What if queries could be written in one language and translated into over 20 others? This would reduce the learning curve to request specific.... See Details Blog Image Lessons Learned From More Than a Decade in Privileged Access Management (PAM) May 20, 2022 Optiv’s Micheal Steele shares insights gained from over 10 years of experience in cyber operations and privileged access management. See Details Blog Pagination First page « First Previous page ‹ Previous … Page 16 Page 17 Page 18 Page 19 Current page 20 Page 21 Page 22 Page 23 Page 24 … Next page Next › Last page Last »
Image Beyond the Buzz: Building Cyber Resilience July 25, 2022 This post by James Turgal discusses the importance of cyber resilience and how to build it across people, processes and technology. See Details Blog
Image Finally, a Shift in Data Security Strategy Designed to Match the Real-World Threat Landscape July 20, 2022 In this blog post, Optiv partner Imperva outlines the function, benefits and "must haves" of a data security fabric solution. See Details Blog
Image New SEC Cybersecurity Rules Focus on Board Accountability July 18, 2022 This post covers a proposed rule set from the SEC that will require cybersecurity disclosures within mandated annual and quarterly reporting. See Details Blog
Image Cyber-Risk Quantification (CRQ): Lessons Learned July 18, 2022 Learn how to successfully implement cyber risk quantification from early adopters and industry surveys. See Details Blog
Image Taking Your Zero Trust Strategy to the Endpoint July 11, 2022 Organizations need to create Zero Trust policies and ensure they have quality endpoint management. Tanium services supported by Optiv will help. See Details Blog
Image Cyber Recovery Considerations: How to Keep the Lights On July 08, 2022 This post examines today's risky digital landscape and introduces a cyber recovery solution to help evolve traditional business continuity plans. See Details Blog
Image Bi-Partisan U.S. Federal Privacy Bill Gains Momentum July 01, 2022 This post discusses ADPAA, a federal law focused on consumer privacy rights that's progressed to a bipartisan draft with traction in Congress. See Details Blog
Image Russia/Ukraine Update - June 2022 June 30, 2022 Cyber attacks in the Russia-Ukraine conflict continue to mount. Get updates about WhisperGate, CaddyWiper and other exploits from Optiv's gTIC. See Details Blog
Image ISMG Optiv Interview: Cyber Recovery Solution June 17, 2022 In this ISMG interview at RSAC 2022, Optiv’s Jessica Hetrick discusses the meaning of cyber recovery. See Details Blog
Image ISMG Optiv Panel: Rationalizing Data Investments June 09, 2022 The more data you use, the more data you find you’ll need. This leads to hard decisions about what investments to make in data projects, technology.... See Details Blog
Image Sigma Rule Translation and Automatic Queries May 26, 2022 What if queries could be written in one language and translated into over 20 others? This would reduce the learning curve to request specific.... See Details Blog
Image Lessons Learned From More Than a Decade in Privileged Access Management (PAM) May 20, 2022 Optiv’s Micheal Steele shares insights gained from over 10 years of experience in cyber operations and privileged access management. See Details Blog
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?