A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Combating Ransomware – Protecting a Nation’s Critical Infrastructure June 17, 2021 Recent high-profile cyber attacks, including the Colonial Pipeline ransomware and SolarWinds supply chain hacks, led to the White House executive.... See Details Blog Image Kubernetes Attack Surface June 17, 2021 Optiv highlights the attack strategy of using forged Kerberos tickets to compromise a domain, and provides ways to defend against it. See Details Blog Image Kerberos - A Domains Achille's Heel June 02, 2021 Optiv highlights the attack strategy of using forged Kerberos tickets to compromise a domain, and provides ways to defend against it. See Details Blog Image Introducing an Automated Approach to Risk Management May 26, 2021 The constant churn of audit and compliance testing drives the need for an automated risk management approach. See Details Blog Image Three Ways to Drive Networking-Security Team Collaboration May 24, 2021 In this guest post, CyberGRX examines cyber attack vectors and offers advice on securing third-party relationships. See Details Blog Image Cybersecurity: Making the World a Better Place May 19, 2021 Sam Smith says he’s proud to be part of an industry that literally helps keep our society from crashing on a daily basis. See Details Blog Image Stop Color-Coding Vulnerabilities, Start Remediating Them May 18, 2021 Optiv’s new remediation pipeline model tests automation before production deployment, thereby speeding up MTTR. See Details Blog Image Breaking the (WDAPT) Rules with COM May 12, 2021 This article explores gaps that allow for the undetected execution of code on systems protected by Microsoft Defender Advanced Threat Protection. See Details Blog Image Third-Party Risk Challenges in Work-From-Home Environments May 11, 2021 In this guest post, CyberGRX examines cyber attack vectors and offers advice on securing third-party relationships. See Details Blog Image Risk Scoring Basics April 30, 2021 Cybersecurity often faces risk fatigue, as newly identified risks seem more significant compared to known ones. This can result in priorities that.... See Details Blog Image Credential Theft Prevention With a Palo Alto Networks NGFW April 23, 2021 We encourage clients to understand and adopt Palo Alto’s powerful credential theft prevention feature. See Details Blog Image Cloud is Resetting Cybersecurity Demands April 15, 2021 Security is often threatened by rapid transformation. This analysis offers advice to businesses migrating their operations and data to the cloud. See Details Blog Pagination First page « First Previous page ‹ Previous … Page 22 Page 23 Page 24 Page 25 Current page 26 Page 27 Page 28 Page 29 Page 30 … Next page Next › Last page Last »
Image Combating Ransomware – Protecting a Nation’s Critical Infrastructure June 17, 2021 Recent high-profile cyber attacks, including the Colonial Pipeline ransomware and SolarWinds supply chain hacks, led to the White House executive.... See Details Blog
Image Kubernetes Attack Surface June 17, 2021 Optiv highlights the attack strategy of using forged Kerberos tickets to compromise a domain, and provides ways to defend against it. See Details Blog
Image Kerberos - A Domains Achille's Heel June 02, 2021 Optiv highlights the attack strategy of using forged Kerberos tickets to compromise a domain, and provides ways to defend against it. See Details Blog
Image Introducing an Automated Approach to Risk Management May 26, 2021 The constant churn of audit and compliance testing drives the need for an automated risk management approach. See Details Blog
Image Three Ways to Drive Networking-Security Team Collaboration May 24, 2021 In this guest post, CyberGRX examines cyber attack vectors and offers advice on securing third-party relationships. See Details Blog
Image Cybersecurity: Making the World a Better Place May 19, 2021 Sam Smith says he’s proud to be part of an industry that literally helps keep our society from crashing on a daily basis. See Details Blog
Image Stop Color-Coding Vulnerabilities, Start Remediating Them May 18, 2021 Optiv’s new remediation pipeline model tests automation before production deployment, thereby speeding up MTTR. See Details Blog
Image Breaking the (WDAPT) Rules with COM May 12, 2021 This article explores gaps that allow for the undetected execution of code on systems protected by Microsoft Defender Advanced Threat Protection. See Details Blog
Image Third-Party Risk Challenges in Work-From-Home Environments May 11, 2021 In this guest post, CyberGRX examines cyber attack vectors and offers advice on securing third-party relationships. See Details Blog
Image Risk Scoring Basics April 30, 2021 Cybersecurity often faces risk fatigue, as newly identified risks seem more significant compared to known ones. This can result in priorities that.... See Details Blog
Image Credential Theft Prevention With a Palo Alto Networks NGFW April 23, 2021 We encourage clients to understand and adopt Palo Alto’s powerful credential theft prevention feature. See Details Blog
Image Cloud is Resetting Cybersecurity Demands April 15, 2021 Security is often threatened by rapid transformation. This analysis offers advice to businesses migrating their operations and data to the cloud. See Details Blog
Would you like to speak to an advisor? Let's Talk Cybersecurity Provide your contact information and we will follow-up shortly. Let's Browse Cybersecurity Just looking? Explore how Optiv serves its ~6,000 clients. Show me AI Security Solutions Show me the Optiv brochure Take me to Optiv's Events page Browse all Services