A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Your Risk is Shifting to Places You Can’t See December 10, 2019 CISOs and their teams face a daunting task fending off cybersecurity threats, which at present number in the hundreds of millions. But security leads.... See Details Blog Image Measuring Cybersecurity ROI Part 1: The Value of Mitigating Risk December 04, 2019 CISOs and their teams face a daunting task fending off cybersecurity threats, which at present number in the hundreds of millions. But security leads.... See Details Blog Image It’s Time Now for Tonight’s Top 10 List: Cybersecurity Acronyms! December 03, 2019 Order a free copy of our infographic book, which defines and illustrates key industry terms. See Details Blog Image Future-Proof Your Digital Business with Zero Trust Security November 20, 2019 The increasingly popular Zero Trust information security model maintains strict access controls by not trusting anyone or any action by default – and.... See Details Blog Image The Danger of Assumptions November 19, 2019 Typically, CISOs are more comfortable discussing “speeds and feeds” than profits and losses. For many directors it’s the exact opposite. For both.... See Details Blog Image AWS Native and Third-Party Tools: New White Paper November 14, 2019 This white paper details the cloud infrastructure assessment tools provided by AWS, Palo Alto Networks and Tenable. See Details Blog Image Building a Holistic Privacy Management Program November 13, 2019 Rather than building programs for individual jurisdictions, organizations should develop holistic programs that address the overarching commonalities. See Details Blog Image This is Not a Drill: Phishing as-a-Service November 07, 2019 1.5 million new phishing sites launch every month thanks to the advent of Phishing as-a-Service offerings. See Details Blog Image Risk Transformation: Bridging Assessment and Execution November 07, 2019 With risk transformation, it can be difficult to bridge the gap between assessment and implementation. See Details Blog Image Cyber Threats, Unintegrated Tools and Alert Fatigue November 06, 2019 Nearly a third of cybersecurity professionals say they ignore alerts because so many are false positives. See Details Blog Image Nemty Ransomware Deployed via Payment Service Phish November 05, 2019 In late August, a new ransomware strain, Nemty, was distributed in the wild. It, coupled with a multitude of other ransomware threats in 2019, demands.... See Details Blog Image How to Get Into Cybersecurity, Even Without a Technical Background October 29, 2019 Many traditional and non-traditional education and training programs can help prepare you for a career in cybersecurity. See Details Blog Pagination First page « First Previous page ‹ Previous … Page 33 Page 34 Page 35 Page 36 Current page 37 Page 38 Page 39 Page 40 Page 41 … Next page Next › Last page Last »
Image Your Risk is Shifting to Places You Can’t See December 10, 2019 CISOs and their teams face a daunting task fending off cybersecurity threats, which at present number in the hundreds of millions. But security leads.... See Details Blog
Image Measuring Cybersecurity ROI Part 1: The Value of Mitigating Risk December 04, 2019 CISOs and their teams face a daunting task fending off cybersecurity threats, which at present number in the hundreds of millions. But security leads.... See Details Blog
Image It’s Time Now for Tonight’s Top 10 List: Cybersecurity Acronyms! December 03, 2019 Order a free copy of our infographic book, which defines and illustrates key industry terms. See Details Blog
Image Future-Proof Your Digital Business with Zero Trust Security November 20, 2019 The increasingly popular Zero Trust information security model maintains strict access controls by not trusting anyone or any action by default – and.... See Details Blog
Image The Danger of Assumptions November 19, 2019 Typically, CISOs are more comfortable discussing “speeds and feeds” than profits and losses. For many directors it’s the exact opposite. For both.... See Details Blog
Image AWS Native and Third-Party Tools: New White Paper November 14, 2019 This white paper details the cloud infrastructure assessment tools provided by AWS, Palo Alto Networks and Tenable. See Details Blog
Image Building a Holistic Privacy Management Program November 13, 2019 Rather than building programs for individual jurisdictions, organizations should develop holistic programs that address the overarching commonalities. See Details Blog
Image This is Not a Drill: Phishing as-a-Service November 07, 2019 1.5 million new phishing sites launch every month thanks to the advent of Phishing as-a-Service offerings. See Details Blog
Image Risk Transformation: Bridging Assessment and Execution November 07, 2019 With risk transformation, it can be difficult to bridge the gap between assessment and implementation. See Details Blog
Image Cyber Threats, Unintegrated Tools and Alert Fatigue November 06, 2019 Nearly a third of cybersecurity professionals say they ignore alerts because so many are false positives. See Details Blog
Image Nemty Ransomware Deployed via Payment Service Phish November 05, 2019 In late August, a new ransomware strain, Nemty, was distributed in the wild. It, coupled with a multitude of other ransomware threats in 2019, demands.... See Details Blog
Image How to Get Into Cybersecurity, Even Without a Technical Background October 29, 2019 Many traditional and non-traditional education and training programs can help prepare you for a career in cybersecurity. See Details Blog
Would you like to speak to an advisor? Let's Talk Cybersecurity Provide your contact information and we will follow-up shortly. Let's Browse Cybersecurity Just looking? Explore how Optiv serves its ~6,000 clients. Show me AI Security Solutions Show me the Optiv brochure Take me to Optiv's Events page Browse all Services