A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Taking Your Zero Trust Strategy to the Endpoint July 11, 2022 Organizations need to create Zero Trust policies and ensure they have quality endpoint management. Tanium services supported by Optiv will help. See Details Blog Image Cyber Recovery Considerations: How to Keep the Lights On July 08, 2022 This post examines today's risky digital landscape and introduces a cyber recovery solution to help evolve traditional business continuity plans. See Details Blog Image Bi-Partisan U.S. Federal Privacy Bill Gains Momentum July 01, 2022 This post discusses ADPAA, a federal law focused on consumer privacy rights that's progressed to a bipartisan draft with traction in Congress. See Details Blog Image Russia/Ukraine Update - June 2022 June 30, 2022 Cyber attacks in the Russia-Ukraine conflict continue to mount. Get updates about WhisperGate, CaddyWiper and other exploits from Optiv's gTIC. See Details Blog Image ISMG Optiv Interview: Cyber Recovery Solution June 17, 2022 In this ISMG interview at RSAC 2022, Optiv’s Jessica Hetrick discusses the meaning of cyber recovery. See Details Blog Image ISMG Optiv Panel: Rationalizing Data Investments June 09, 2022 The more data you use, the more data you find you’ll need. This leads to hard decisions about what investments to make in data projects, technology.... See Details Blog Image Sigma Rule Translation and Automatic Queries May 26, 2022 What if queries could be written in one language and translated into over 20 others? This would reduce the learning curve to request specific.... See Details Blog Image Lessons Learned From More Than a Decade in Privileged Access Management (PAM) May 20, 2022 Optiv’s Micheal Steele shares insights gained from over 10 years of experience in cyber operations and privileged access management. See Details Blog Image REvil Reemergence: Real, Fake or Rebranding? May 16, 2022 The REvil Ransomware group’s reemergence isn’t a surprise, given the context of the Ukraine invasion. See Details Blog Image Prioritizing Remediation Efforts via Risk-based Scoring May 11, 2022 Our new vulnerability and asset scoring mechanism more accurately identifies business risk associated with vulnerabilities. See Details Blog Image Keeping Your Organization Safe With Endpoint Protection May 09, 2022 In this series, we explain the threats, issues and impacts associated with managing third-party organizations and discuss how best to minimize risk. See Details Blog Image Thick Client Application Security Testing May 03, 2022 This post highlights different tools and approaches for testing thick client applications for vulnerabilities. See Details Blog Pagination First page « First Previous page ‹ Previous … Page 16 Page 17 Page 18 Page 19 Current page 20 Page 21 Page 22 Page 23 Page 24 … Next page Next › Last page Last »
Image Taking Your Zero Trust Strategy to the Endpoint July 11, 2022 Organizations need to create Zero Trust policies and ensure they have quality endpoint management. Tanium services supported by Optiv will help. See Details Blog
Image Cyber Recovery Considerations: How to Keep the Lights On July 08, 2022 This post examines today's risky digital landscape and introduces a cyber recovery solution to help evolve traditional business continuity plans. See Details Blog
Image Bi-Partisan U.S. Federal Privacy Bill Gains Momentum July 01, 2022 This post discusses ADPAA, a federal law focused on consumer privacy rights that's progressed to a bipartisan draft with traction in Congress. See Details Blog
Image Russia/Ukraine Update - June 2022 June 30, 2022 Cyber attacks in the Russia-Ukraine conflict continue to mount. Get updates about WhisperGate, CaddyWiper and other exploits from Optiv's gTIC. See Details Blog
Image ISMG Optiv Interview: Cyber Recovery Solution June 17, 2022 In this ISMG interview at RSAC 2022, Optiv’s Jessica Hetrick discusses the meaning of cyber recovery. See Details Blog
Image ISMG Optiv Panel: Rationalizing Data Investments June 09, 2022 The more data you use, the more data you find you’ll need. This leads to hard decisions about what investments to make in data projects, technology.... See Details Blog
Image Sigma Rule Translation and Automatic Queries May 26, 2022 What if queries could be written in one language and translated into over 20 others? This would reduce the learning curve to request specific.... See Details Blog
Image Lessons Learned From More Than a Decade in Privileged Access Management (PAM) May 20, 2022 Optiv’s Micheal Steele shares insights gained from over 10 years of experience in cyber operations and privileged access management. See Details Blog
Image REvil Reemergence: Real, Fake or Rebranding? May 16, 2022 The REvil Ransomware group’s reemergence isn’t a surprise, given the context of the Ukraine invasion. See Details Blog
Image Prioritizing Remediation Efforts via Risk-based Scoring May 11, 2022 Our new vulnerability and asset scoring mechanism more accurately identifies business risk associated with vulnerabilities. See Details Blog
Image Keeping Your Organization Safe With Endpoint Protection May 09, 2022 In this series, we explain the threats, issues and impacts associated with managing third-party organizations and discuss how best to minimize risk. See Details Blog
Image Thick Client Application Security Testing May 03, 2022 This post highlights different tools and approaches for testing thick client applications for vulnerabilities. See Details Blog