A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Accelerating Vulnerability Remediation with Automation April 12, 2021 We reduced mean time to remediate by accelerating the processes from vulnerability discovery to the deployment of a corrective system update. See Details Blog Image Adopt and Adapt: How to Get Authentication Right April 08, 2021 Authentication factors like biometrics, WebAuthn/FIDO2.0 and mobile apps with push notifications provide the best security defense. See Details Blog Image Talking to the Board About Cybersecurity’s New Realities April 06, 2021 Getting approval for cybersecurity priorities is tougher than ever. Here’s some advice on talking to the board about the new IT security realities. See Details Blog Image Policies and Standards and Procedures – Oh My! March 31, 2021 This post provides analysis and insight into building an effective policy structure for your organization. See Details Blog Image Firefox Addons For Application Security Testing March 24, 2021 Firefox’s appsec add-ons make it a useful tool for new pen testers who can’t afford professional tools. See Details Blog Image MobileIron MDM Contains Static Key Allowing Account Enumeration March 22, 2021 MobileIron MDM exposes account enumeration and SFA to unauthenticated attacks. This analysis details how to mitigate this vulnerability. See Details Blog Image BadOutlook for C2 March 18, 2021 Given Office product functionality, it’s possible for adversaries to leverage Outlook's COM interface in attacks for extended persistence. See Details Blog Image Where CASB and SWG Are Headed March 16, 2021 Recent cloud access security brokers and secure web gateways reports suggest we’re rapidly moving toward a secure access service edge future. See Details Blog Image Microsoft Exchange “Hafnium” Hack: Recommended Steps March 10, 2021 Take these immediate steps to protect your data against the recent Microsoft Exchange Server hack. See Details Blog Image SUNBURST, Supply Chain Attacks and How to Detect Them February 26, 2021 Sri Sundaralingam of ExtraHop identifies some common supply chain hack elements and explains how to discover and stop them in the early stages. See Details Blog Image Cybersecurity Helps Me Protect Family, Friends and Myself February 19, 2021 Senior Marketing Product Manager Greg L says working in cybersecurity means protecting your family, your friends and your community. See Details Blog Image Cybersecurity Risk Assessment Tiering February 18, 2021 Risk assessments must consider people, process and technology. A three-tiered approach reduces risk and exposure. See Details Blog Pagination First page « First Previous page ‹ Previous … Page 23 Page 24 Page 25 Page 26 Current page 27 Page 28 Page 29 Page 30 Page 31 … Next page Next › Last page Last »
Image Accelerating Vulnerability Remediation with Automation April 12, 2021 We reduced mean time to remediate by accelerating the processes from vulnerability discovery to the deployment of a corrective system update. See Details Blog
Image Adopt and Adapt: How to Get Authentication Right April 08, 2021 Authentication factors like biometrics, WebAuthn/FIDO2.0 and mobile apps with push notifications provide the best security defense. See Details Blog
Image Talking to the Board About Cybersecurity’s New Realities April 06, 2021 Getting approval for cybersecurity priorities is tougher than ever. Here’s some advice on talking to the board about the new IT security realities. See Details Blog
Image Policies and Standards and Procedures – Oh My! March 31, 2021 This post provides analysis and insight into building an effective policy structure for your organization. See Details Blog
Image Firefox Addons For Application Security Testing March 24, 2021 Firefox’s appsec add-ons make it a useful tool for new pen testers who can’t afford professional tools. See Details Blog
Image MobileIron MDM Contains Static Key Allowing Account Enumeration March 22, 2021 MobileIron MDM exposes account enumeration and SFA to unauthenticated attacks. This analysis details how to mitigate this vulnerability. See Details Blog
Image BadOutlook for C2 March 18, 2021 Given Office product functionality, it’s possible for adversaries to leverage Outlook's COM interface in attacks for extended persistence. See Details Blog
Image Where CASB and SWG Are Headed March 16, 2021 Recent cloud access security brokers and secure web gateways reports suggest we’re rapidly moving toward a secure access service edge future. See Details Blog
Image Microsoft Exchange “Hafnium” Hack: Recommended Steps March 10, 2021 Take these immediate steps to protect your data against the recent Microsoft Exchange Server hack. See Details Blog
Image SUNBURST, Supply Chain Attacks and How to Detect Them February 26, 2021 Sri Sundaralingam of ExtraHop identifies some common supply chain hack elements and explains how to discover and stop them in the early stages. See Details Blog
Image Cybersecurity Helps Me Protect Family, Friends and Myself February 19, 2021 Senior Marketing Product Manager Greg L says working in cybersecurity means protecting your family, your friends and your community. See Details Blog
Image Cybersecurity Risk Assessment Tiering February 18, 2021 Risk assessments must consider people, process and technology. A three-tiered approach reduces risk and exposure. See Details Blog
Would you like to speak to an advisor? Let's Talk Cybersecurity Provide your contact information and we will follow-up shortly. Let's Browse Cybersecurity Just looking? Explore how Optiv serves its ~6,000 clients. Show me AI Security Solutions Show me the Optiv brochure Take me to Optiv's Events page Browse all Services