A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image This is Not a Drill: Phishing as-a-Service November 07, 2019 1.5 million new phishing sites launch every month thanks to the advent of Phishing as-a-Service offerings. See Details Blog Image Risk Transformation: Bridging Assessment and Execution November 07, 2019 With risk transformation, it can be difficult to bridge the gap between assessment and implementation. See Details Blog Image Cyber Threats, Unintegrated Tools and Alert Fatigue November 06, 2019 Nearly a third of cybersecurity professionals say they ignore alerts because so many are false positives. See Details Blog Image Nemty Ransomware Deployed via Payment Service Phish November 05, 2019 In late August, a new ransomware strain, Nemty, was distributed in the wild. It, coupled with a multitude of other ransomware threats in 2019, demands.... See Details Blog Image How to Get Into Cybersecurity, Even Without a Technical Background October 29, 2019 Many traditional and non-traditional education and training programs can help prepare you for a career in cybersecurity. See Details Blog Image Territory Account Managers: Growing our SalesForce October 24, 2019 We’ve introduced the Territory Account Manager position to help address new, more challenging cybersecurity threats. See Details Blog Image Six Reasons to Consider a Career in Cybersecurity October 22, 2019 One of the most promising career fields is the booming cybersecurity industry. See Details Blog Image Cybersecurity Awareness and the Bystander Effect October 18, 2019 The K12 sector sees a large number of cybersecurity incidents each year, including unauthorized disclosure of data by staff, students and vendors as.... See Details Blog Image Just How Big is Cybercrime, Anyway? October 17, 2019 The global cost of cybercrime is expected to hit $6 trillion annually by 2021. How big a deal is that? By one reckoning cybercrime is already worth $1.... See Details Blog Image 2019 Cyber Threat Intelligence Estimate: Security Must Be Strategic October 16, 2019 The 2019 CTIE shows security practitioners must be familiar with their environments and global trends. See Details Blog Image National Cybersecurity Awareness Month and Cybersecurity Culture October 15, 2019 Promoting a cybersecurity culture and transforming employees into “human firewalls” is effective at reducing vulnerability. See Details Blog Image CloudFormation Templates: What’s in That Stack? October 10, 2019 In this blog we show an example of a basic formation template attack. It’s opportunistic and it would be very hard to target a specific organization.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 33 Page 34 Page 35 Page 36 Current page 37 Page 38 Page 39 Page 40 Page 41 … Next page Next › Last page Last »
Image This is Not a Drill: Phishing as-a-Service November 07, 2019 1.5 million new phishing sites launch every month thanks to the advent of Phishing as-a-Service offerings. See Details Blog
Image Risk Transformation: Bridging Assessment and Execution November 07, 2019 With risk transformation, it can be difficult to bridge the gap between assessment and implementation. See Details Blog
Image Cyber Threats, Unintegrated Tools and Alert Fatigue November 06, 2019 Nearly a third of cybersecurity professionals say they ignore alerts because so many are false positives. See Details Blog
Image Nemty Ransomware Deployed via Payment Service Phish November 05, 2019 In late August, a new ransomware strain, Nemty, was distributed in the wild. It, coupled with a multitude of other ransomware threats in 2019, demands.... See Details Blog
Image How to Get Into Cybersecurity, Even Without a Technical Background October 29, 2019 Many traditional and non-traditional education and training programs can help prepare you for a career in cybersecurity. See Details Blog
Image Territory Account Managers: Growing our SalesForce October 24, 2019 We’ve introduced the Territory Account Manager position to help address new, more challenging cybersecurity threats. See Details Blog
Image Six Reasons to Consider a Career in Cybersecurity October 22, 2019 One of the most promising career fields is the booming cybersecurity industry. See Details Blog
Image Cybersecurity Awareness and the Bystander Effect October 18, 2019 The K12 sector sees a large number of cybersecurity incidents each year, including unauthorized disclosure of data by staff, students and vendors as.... See Details Blog
Image Just How Big is Cybercrime, Anyway? October 17, 2019 The global cost of cybercrime is expected to hit $6 trillion annually by 2021. How big a deal is that? By one reckoning cybercrime is already worth $1.... See Details Blog
Image 2019 Cyber Threat Intelligence Estimate: Security Must Be Strategic October 16, 2019 The 2019 CTIE shows security practitioners must be familiar with their environments and global trends. See Details Blog
Image National Cybersecurity Awareness Month and Cybersecurity Culture October 15, 2019 Promoting a cybersecurity culture and transforming employees into “human firewalls” is effective at reducing vulnerability. See Details Blog
Image CloudFormation Templates: What’s in That Stack? October 10, 2019 In this blog we show an example of a basic formation template attack. It’s opportunistic and it would be very hard to target a specific organization.... See Details Blog