A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image PetitPotam & Active Directory Certificate Services August 10, 2021 Multiple CVEs involving Active Directory Certificate Services and a new NTLM relay attack can be chained to compromise an Active Directory domain. See Details Blog Image Governing Identities in a Hybrid, Multi-Cloud Environment July 13, 2021 This post explains how identity is central to a secure cloud access governance program. See Details Blog Image Zero Trust is About Changing Security Mentality July 08, 2021 Zero Trust safeguards assets and data in the cloud, but organizations should also invest in building a Zero Trust culture. See Details Blog Image What Does the Cybersecurity Executive Order Mean for You? June 29, 2021 The executive order on cybersecurity emphasizes coordinated, mandated levels of controls to respond to a growing threat to critical infrastructure. See Details Blog Image Go365: Office 365 Password Spraying Tool June 17, 2021 Go365 performs user enumeration and password spraying attacks on organizations that use Office 365. See Details Blog Image Combating Ransomware – Protecting a Nation’s Critical Infrastructure June 17, 2021 Recent high-profile cyber attacks, including the Colonial Pipeline ransomware and SolarWinds supply chain hacks, led to the White House executive.... See Details Blog Image Kubernetes Attack Surface June 17, 2021 Optiv highlights the attack strategy of using forged Kerberos tickets to compromise a domain, and provides ways to defend against it. See Details Blog Image Kerberos - A Domains Achille's Heel June 02, 2021 Optiv highlights the attack strategy of using forged Kerberos tickets to compromise a domain, and provides ways to defend against it. See Details Blog Image Introducing an Automated Approach to Risk Management May 26, 2021 The constant churn of audit and compliance testing drives the need for an automated risk management approach. See Details Blog Image Three Ways to Drive Networking-Security Team Collaboration May 24, 2021 In this guest post, CyberGRX examines cyber attack vectors and offers advice on securing third-party relationships. See Details Blog Image Cybersecurity: Making the World a Better Place May 19, 2021 Sam Smith says he’s proud to be part of an industry that literally helps keep our society from crashing on a daily basis. See Details Blog Image Stop Color-Coding Vulnerabilities, Start Remediating Them May 18, 2021 Optiv’s new remediation pipeline model tests automation before production deployment, thereby speeding up MTTR. See Details Blog Pagination First page « First Previous page ‹ Previous … Page 21 Page 22 Page 23 Page 24 Current page 25 Page 26 Page 27 Page 28 Page 29 … Next page Next › Last page Last »
Image PetitPotam & Active Directory Certificate Services August 10, 2021 Multiple CVEs involving Active Directory Certificate Services and a new NTLM relay attack can be chained to compromise an Active Directory domain. See Details Blog
Image Governing Identities in a Hybrid, Multi-Cloud Environment July 13, 2021 This post explains how identity is central to a secure cloud access governance program. See Details Blog
Image Zero Trust is About Changing Security Mentality July 08, 2021 Zero Trust safeguards assets and data in the cloud, but organizations should also invest in building a Zero Trust culture. See Details Blog
Image What Does the Cybersecurity Executive Order Mean for You? June 29, 2021 The executive order on cybersecurity emphasizes coordinated, mandated levels of controls to respond to a growing threat to critical infrastructure. See Details Blog
Image Go365: Office 365 Password Spraying Tool June 17, 2021 Go365 performs user enumeration and password spraying attacks on organizations that use Office 365. See Details Blog
Image Combating Ransomware – Protecting a Nation’s Critical Infrastructure June 17, 2021 Recent high-profile cyber attacks, including the Colonial Pipeline ransomware and SolarWinds supply chain hacks, led to the White House executive.... See Details Blog
Image Kubernetes Attack Surface June 17, 2021 Optiv highlights the attack strategy of using forged Kerberos tickets to compromise a domain, and provides ways to defend against it. See Details Blog
Image Kerberos - A Domains Achille's Heel June 02, 2021 Optiv highlights the attack strategy of using forged Kerberos tickets to compromise a domain, and provides ways to defend against it. See Details Blog
Image Introducing an Automated Approach to Risk Management May 26, 2021 The constant churn of audit and compliance testing drives the need for an automated risk management approach. See Details Blog
Image Three Ways to Drive Networking-Security Team Collaboration May 24, 2021 In this guest post, CyberGRX examines cyber attack vectors and offers advice on securing third-party relationships. See Details Blog
Image Cybersecurity: Making the World a Better Place May 19, 2021 Sam Smith says he’s proud to be part of an industry that literally helps keep our society from crashing on a daily basis. See Details Blog
Image Stop Color-Coding Vulnerabilities, Start Remediating Them May 18, 2021 Optiv’s new remediation pipeline model tests automation before production deployment, thereby speeding up MTTR. See Details Blog