A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Just How Big is Cybercrime, Anyway? October 17, 2019 The global cost of cybercrime is expected to hit $6 trillion annually by 2021. How big a deal is that? By one reckoning cybercrime is already worth $1.... See Details Blog Image 2019 Cyber Threat Intelligence Estimate: Security Must Be Strategic October 16, 2019 The 2019 CTIE shows security practitioners must be familiar with their environments and global trends. See Details Blog Image National Cybersecurity Awareness Month and Cybersecurity Culture October 15, 2019 Promoting a cybersecurity culture and transforming employees into “human firewalls” is effective at reducing vulnerability. See Details Blog Image CloudFormation Templates: What’s in That Stack? October 10, 2019 In this blog we show an example of a basic formation template attack. It’s opportunistic and it would be very hard to target a specific organization.... See Details Blog Image Service Providers and PCI Compliance, Part 3 – Remediating Missing Due Diligence October 08, 2019 Part three of this series addressing an organization's PCI-DSS compliance obligations when they use cloud services (IAAS, PAAS, or SAAS). Part two.... See Details Blog Image Personal Security Habits – Looking Inward October 04, 2019 Every individual’s awareness and behavior contribute to an organization’s security. While routine awareness training may seem remedial to many of us.... See Details Blog Image Third-Party Risk Management – 4 Steps for a Successful Program October 03, 2019 This post focuses on expanding partnerships, information sharing between organizations and ensuring third parties protect our data. See Details Blog Image Service Providers and PCI Compliance, Part 2 – Third-Party Risk Management September 30, 2019 In this post, Service Providers and PCI Compliance, Part 2 – Third-Party Risk Management, we look more closely at the relationships between.... See Details Blog Image Cybersecurity: Tech to Buy, Tech to Watch, What’s the Scoop? September 26, 2019 When it comes deciding what cybersecurity technology to invest in, compiling data can keep you from acquiring something that sits on the shelf.... See Details Blog Image ATT&CK Series: Impact September 24, 2019 In this post, we will look at ATT&CK’s Impact Phase as it affects availability and integrity. There are several different techniques adversaries can.... See Details Blog Image What Are the Top Technologies to Watch? September 19, 2019 What technology should you look at investing in? Endpoint? Zero Trust Architecture? Security Awareness Training? SOAR? Digital transformation, which.... See Details Blog Image Einstein and Security Awareness September 18, 2019 October is National Cybersecurity Awareness Month – NCSAM. Security awareness programs are designed to educate end-users about cyber threats and what.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 34 Page 35 Page 36 Page 37 Current page 38 Page 39 Page 40 Page 41 Page 42 … Next page Next › Last page Last »
Image Just How Big is Cybercrime, Anyway? October 17, 2019 The global cost of cybercrime is expected to hit $6 trillion annually by 2021. How big a deal is that? By one reckoning cybercrime is already worth $1.... See Details Blog
Image 2019 Cyber Threat Intelligence Estimate: Security Must Be Strategic October 16, 2019 The 2019 CTIE shows security practitioners must be familiar with their environments and global trends. See Details Blog
Image National Cybersecurity Awareness Month and Cybersecurity Culture October 15, 2019 Promoting a cybersecurity culture and transforming employees into “human firewalls” is effective at reducing vulnerability. See Details Blog
Image CloudFormation Templates: What’s in That Stack? October 10, 2019 In this blog we show an example of a basic formation template attack. It’s opportunistic and it would be very hard to target a specific organization.... See Details Blog
Image Service Providers and PCI Compliance, Part 3 – Remediating Missing Due Diligence October 08, 2019 Part three of this series addressing an organization's PCI-DSS compliance obligations when they use cloud services (IAAS, PAAS, or SAAS). Part two.... See Details Blog
Image Personal Security Habits – Looking Inward October 04, 2019 Every individual’s awareness and behavior contribute to an organization’s security. While routine awareness training may seem remedial to many of us.... See Details Blog
Image Third-Party Risk Management – 4 Steps for a Successful Program October 03, 2019 This post focuses on expanding partnerships, information sharing between organizations and ensuring third parties protect our data. See Details Blog
Image Service Providers and PCI Compliance, Part 2 – Third-Party Risk Management September 30, 2019 In this post, Service Providers and PCI Compliance, Part 2 – Third-Party Risk Management, we look more closely at the relationships between.... See Details Blog
Image Cybersecurity: Tech to Buy, Tech to Watch, What’s the Scoop? September 26, 2019 When it comes deciding what cybersecurity technology to invest in, compiling data can keep you from acquiring something that sits on the shelf.... See Details Blog
Image ATT&CK Series: Impact September 24, 2019 In this post, we will look at ATT&CK’s Impact Phase as it affects availability and integrity. There are several different techniques adversaries can.... See Details Blog
Image What Are the Top Technologies to Watch? September 19, 2019 What technology should you look at investing in? Endpoint? Zero Trust Architecture? Security Awareness Training? SOAR? Digital transformation, which.... See Details Blog
Image Einstein and Security Awareness September 18, 2019 October is National Cybersecurity Awareness Month – NCSAM. Security awareness programs are designed to educate end-users about cyber threats and what.... See Details Blog
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?