A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image MDR vs EDR vs NDR: What Is Right for Your Business Needs? September 01, 2021 Threat detection and response is cybersecurity’s core function. Tactics and techniques have evolved (MDR, EDR, NDR). Let’s compare. See Details Blog Image Now You Know – Varonis DatAlert Suite August 26, 2021 This post overviews the Varonis DatAlert Suite, its capabilities and how it stacks on top of the core Varonis Data Security Platform. See Details Blog Image Active Directory Security: “Drift Happens” August 17, 2021 Tenable’s Derek Melber explains why security teams should secure existing hardware, operating systems, applications, software and Active Directory. See Details Blog Image Microsoft 365 OAuth Device Code Flow and Phishing August 17, 2021 We leveraged Microsoft’s OAuth authorization flow for a phishing attack. Here’s step-by-step guidance on how to conduct it for security assessment. See Details Blog Image In Business, the First Casualty of Innovation Is Security August 13, 2021 Few organizations know how to secure cloud data. Visibility, discovery and classification drives costs down while improving the customer experience. See Details Blog Image Automated Endpoint Evaluations – Part 1 August 12, 2021 Optiv researcher Dan Kiraly examines automated endpoint evaluations in the first technical video of a series. See Details Blog Image PetitPotam & Active Directory Certificate Services August 10, 2021 Multiple CVEs involving Active Directory Certificate Services and a new NTLM relay attack can be chained to compromise an Active Directory domain. See Details Blog Image Governing Identities in a Hybrid, Multi-Cloud Environment July 13, 2021 This post explains how identity is central to a secure cloud access governance program. See Details Blog Image Zero Trust is About Changing Security Mentality July 08, 2021 Zero Trust safeguards assets and data in the cloud, but organizations should also invest in building a Zero Trust culture. See Details Blog Image What Does the Cybersecurity Executive Order Mean for You? June 29, 2021 The executive order on cybersecurity emphasizes coordinated, mandated levels of controls to respond to a growing threat to critical infrastructure. See Details Blog Image Go365: Office 365 Password Spraying Tool June 17, 2021 Go365 performs user enumeration and password spraying attacks on organizations that use Office 365. See Details Blog Image Combating Ransomware – Protecting a Nation’s Critical Infrastructure June 17, 2021 Recent high-profile cyber attacks, including the Colonial Pipeline ransomware and SolarWinds supply chain hacks, led to the White House executive.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 21 Page 22 Page 23 Page 24 Current page 25 Page 26 Page 27 Page 28 Page 29 … Next page Next › Last page Last »
Image MDR vs EDR vs NDR: What Is Right for Your Business Needs? September 01, 2021 Threat detection and response is cybersecurity’s core function. Tactics and techniques have evolved (MDR, EDR, NDR). Let’s compare. See Details Blog
Image Now You Know – Varonis DatAlert Suite August 26, 2021 This post overviews the Varonis DatAlert Suite, its capabilities and how it stacks on top of the core Varonis Data Security Platform. See Details Blog
Image Active Directory Security: “Drift Happens” August 17, 2021 Tenable’s Derek Melber explains why security teams should secure existing hardware, operating systems, applications, software and Active Directory. See Details Blog
Image Microsoft 365 OAuth Device Code Flow and Phishing August 17, 2021 We leveraged Microsoft’s OAuth authorization flow for a phishing attack. Here’s step-by-step guidance on how to conduct it for security assessment. See Details Blog
Image In Business, the First Casualty of Innovation Is Security August 13, 2021 Few organizations know how to secure cloud data. Visibility, discovery and classification drives costs down while improving the customer experience. See Details Blog
Image Automated Endpoint Evaluations – Part 1 August 12, 2021 Optiv researcher Dan Kiraly examines automated endpoint evaluations in the first technical video of a series. See Details Blog
Image PetitPotam & Active Directory Certificate Services August 10, 2021 Multiple CVEs involving Active Directory Certificate Services and a new NTLM relay attack can be chained to compromise an Active Directory domain. See Details Blog
Image Governing Identities in a Hybrid, Multi-Cloud Environment July 13, 2021 This post explains how identity is central to a secure cloud access governance program. See Details Blog
Image Zero Trust is About Changing Security Mentality July 08, 2021 Zero Trust safeguards assets and data in the cloud, but organizations should also invest in building a Zero Trust culture. See Details Blog
Image What Does the Cybersecurity Executive Order Mean for You? June 29, 2021 The executive order on cybersecurity emphasizes coordinated, mandated levels of controls to respond to a growing threat to critical infrastructure. See Details Blog
Image Go365: Office 365 Password Spraying Tool June 17, 2021 Go365 performs user enumeration and password spraying attacks on organizations that use Office 365. See Details Blog
Image Combating Ransomware – Protecting a Nation’s Critical Infrastructure June 17, 2021 Recent high-profile cyber attacks, including the Colonial Pipeline ransomware and SolarWinds supply chain hacks, led to the White House executive.... See Details Blog
Would you like to speak to an advisor? Let's Talk Cybersecurity Provide your contact information and we will follow-up shortly. Let's Browse Cybersecurity Just looking? Explore how Optiv serves its ~6,000 clients. Show me AI Security Solutions Show me the Optiv brochure Take me to Optiv's Events page Browse all Services