A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image BadOutlook for C2 March 18, 2021 Given Office product functionality, it’s possible for adversaries to leverage Outlook's COM interface in attacks for extended persistence. See Details Blog Image Where CASB and SWG Are Headed March 16, 2021 Recent cloud access security brokers and secure web gateways reports suggest we’re rapidly moving toward a secure access service edge future. See Details Blog Image Microsoft Exchange “Hafnium” Hack: Recommended Steps March 10, 2021 Take these immediate steps to protect your data against the recent Microsoft Exchange Server hack. See Details Blog Image SUNBURST, Supply Chain Attacks and How to Detect Them February 26, 2021 Sri Sundaralingam of ExtraHop identifies some common supply chain hack elements and explains how to discover and stop them in the early stages. See Details Blog Image Cybersecurity Helps Me Protect Family, Friends and Myself February 19, 2021 Senior Marketing Product Manager Greg L says working in cybersecurity means protecting your family, your friends and your community. See Details Blog Image Cybersecurity Risk Assessment Tiering February 18, 2021 Risk assessments must consider people, process and technology. A three-tiered approach reduces risk and exposure. See Details Blog Image Automating Captcha Attacks February 17, 2021 Captcha images don’t provide robust protection as a primary security control. This analysis explores how to prevent automated (bot) attacks. See Details Blog Image Attempted Florida Water Supply Tampering Underscores IoT/OT Security Challenges February 10, 2021 Concerned about the recent Florida water system hack? We can help assess and secure your IoT and OT infrastructure. See Details Blog Image Critical Areas in Evaluating Third-Party Risks February 04, 2021 This post addresses key areas organizations should evaluate when reviewing or building out third-party risk management programs. See Details Blog Image EDR and Blending In: How Attackers Avoid Getting Caught February 03, 2021 Even when the hooks are removed, defenders can still leverage other EDR functions, such as host isolation for incident triage or remote. See Details Blog Image Endpoint Detection and Response: How Hackers Have Evolved February 02, 2021 This post identifies systemic endpoint detection and response issues and examines how attackers can bypass any EDR product. See Details Blog Image The Evolution of Cloud Forensics and Incident Response February 01, 2021 Toolsets have evolved for high-fidelity forensics and investigations – here we map them to the MITRE ATT&CK framework for Enterprise Cloud. See Details Blog Pagination First page « First Previous page ‹ Previous … Page 23 Page 24 Page 25 Page 26 Current page 27 Page 28 Page 29 Page 30 Page 31 … Next page Next › Last page Last »
Image BadOutlook for C2 March 18, 2021 Given Office product functionality, it’s possible for adversaries to leverage Outlook's COM interface in attacks for extended persistence. See Details Blog
Image Where CASB and SWG Are Headed March 16, 2021 Recent cloud access security brokers and secure web gateways reports suggest we’re rapidly moving toward a secure access service edge future. See Details Blog
Image Microsoft Exchange “Hafnium” Hack: Recommended Steps March 10, 2021 Take these immediate steps to protect your data against the recent Microsoft Exchange Server hack. See Details Blog
Image SUNBURST, Supply Chain Attacks and How to Detect Them February 26, 2021 Sri Sundaralingam of ExtraHop identifies some common supply chain hack elements and explains how to discover and stop them in the early stages. See Details Blog
Image Cybersecurity Helps Me Protect Family, Friends and Myself February 19, 2021 Senior Marketing Product Manager Greg L says working in cybersecurity means protecting your family, your friends and your community. See Details Blog
Image Cybersecurity Risk Assessment Tiering February 18, 2021 Risk assessments must consider people, process and technology. A three-tiered approach reduces risk and exposure. See Details Blog
Image Automating Captcha Attacks February 17, 2021 Captcha images don’t provide robust protection as a primary security control. This analysis explores how to prevent automated (bot) attacks. See Details Blog
Image Attempted Florida Water Supply Tampering Underscores IoT/OT Security Challenges February 10, 2021 Concerned about the recent Florida water system hack? We can help assess and secure your IoT and OT infrastructure. See Details Blog
Image Critical Areas in Evaluating Third-Party Risks February 04, 2021 This post addresses key areas organizations should evaluate when reviewing or building out third-party risk management programs. See Details Blog
Image EDR and Blending In: How Attackers Avoid Getting Caught February 03, 2021 Even when the hooks are removed, defenders can still leverage other EDR functions, such as host isolation for incident triage or remote. See Details Blog
Image Endpoint Detection and Response: How Hackers Have Evolved February 02, 2021 This post identifies systemic endpoint detection and response issues and examines how attackers can bypass any EDR product. See Details Blog
Image The Evolution of Cloud Forensics and Incident Response February 01, 2021 Toolsets have evolved for high-fidelity forensics and investigations – here we map them to the MITRE ATT&CK framework for Enterprise Cloud. See Details Blog