A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Cybersecurity Lapses Can Derail the M&A Train July 31, 2019 Typical M&A concerns include overpaying for an acquired company and assimilating cultures. Executives often spend less time worrying about.... See Details Blog Image Managing Security with MITRE ATT&CK July 30, 2019 Optiv has been using the MITRE Adversary Tactics and Techniques and Common Knowledge (ATT&CK) framework to help clients strategically manage.... See Details Blog Image Closing the People, Processes and Technology Gap: How Innovation Can Strengthen Your Cybersecurity Program July 24, 2019 Learn how to achieve the right combination of people, processes and technology to evolve your cybersecurity program. See Details Blog Image SOCs vs. AFCs: What’s the Difference? July 22, 2019 Discover how an AFC differs from a traditional SOC and the top 10 best practices for implementing your own Advanced Fusion Center. See Details Blog Image The Evolution of Cybercrime July 18, 2019 Fayyaz Rajpari, our Executive Services Director discusses this evolution with Ron Darnall, our senior direct of threat intelligence and Ken Dunham.... See Details Blog Image ATT&CK Series: Exfiltration July 16, 2019 In this post, we will address some of the MITRE ATT&CK’s Exfiltration techniques and tactics, from an attacker’s point of view, that may be used to.... See Details Blog Image Will the Real SDP Please Stand Up? July 10, 2019 The term Software Defined Perimeter (SDP) has recently gained popularity and represents a new and agile way to provide secure access in a Zero Trust.... See Details Blog Image ATT&CK Series: Lateral Movement Techniques June 25, 2019 There are several different methods that adversaries can employ to move throughout a network. However, we will cover two techniques commonly used by.... See Details Blog Image Managing Identity in the Digital World June 19, 2019 Understanding who has access to systems and data has never been more important. The demand for mobility and accessibility which has driven the move to.... See Details Blog Image Endpoint Testing via MITRE ATT&CK June 13, 2019 Endpoint security solution providers continue to race toward the same goal—a multifunctional platform that includes prevention, detection, response.... See Details Blog Image Is Your IDM Technology Healthy? June 12, 2019 So, is your IDM programme healthy? If it is built to implement a holistic and strategic vision for identity governance and administration across your.... See Details Blog Image Blockchain: Why Security Hyper-Vigilance is Recommended June 11, 2019 Blockchain’s long-term role in digital transformation is to be determined, although it’s likely to be a key player. Like other nascent technologies.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 36 Page 37 Page 38 Page 39 Current page 40 Page 41 Page 42 Page 43 Page 44 … Next page Next › Last page Last »
Image Cybersecurity Lapses Can Derail the M&A Train July 31, 2019 Typical M&A concerns include overpaying for an acquired company and assimilating cultures. Executives often spend less time worrying about.... See Details Blog
Image Managing Security with MITRE ATT&CK July 30, 2019 Optiv has been using the MITRE Adversary Tactics and Techniques and Common Knowledge (ATT&CK) framework to help clients strategically manage.... See Details Blog
Image Closing the People, Processes and Technology Gap: How Innovation Can Strengthen Your Cybersecurity Program July 24, 2019 Learn how to achieve the right combination of people, processes and technology to evolve your cybersecurity program. See Details Blog
Image SOCs vs. AFCs: What’s the Difference? July 22, 2019 Discover how an AFC differs from a traditional SOC and the top 10 best practices for implementing your own Advanced Fusion Center. See Details Blog
Image The Evolution of Cybercrime July 18, 2019 Fayyaz Rajpari, our Executive Services Director discusses this evolution with Ron Darnall, our senior direct of threat intelligence and Ken Dunham.... See Details Blog
Image ATT&CK Series: Exfiltration July 16, 2019 In this post, we will address some of the MITRE ATT&CK’s Exfiltration techniques and tactics, from an attacker’s point of view, that may be used to.... See Details Blog
Image Will the Real SDP Please Stand Up? July 10, 2019 The term Software Defined Perimeter (SDP) has recently gained popularity and represents a new and agile way to provide secure access in a Zero Trust.... See Details Blog
Image ATT&CK Series: Lateral Movement Techniques June 25, 2019 There are several different methods that adversaries can employ to move throughout a network. However, we will cover two techniques commonly used by.... See Details Blog
Image Managing Identity in the Digital World June 19, 2019 Understanding who has access to systems and data has never been more important. The demand for mobility and accessibility which has driven the move to.... See Details Blog
Image Endpoint Testing via MITRE ATT&CK June 13, 2019 Endpoint security solution providers continue to race toward the same goal—a multifunctional platform that includes prevention, detection, response.... See Details Blog
Image Is Your IDM Technology Healthy? June 12, 2019 So, is your IDM programme healthy? If it is built to implement a holistic and strategic vision for identity governance and administration across your.... See Details Blog
Image Blockchain: Why Security Hyper-Vigilance is Recommended June 11, 2019 Blockchain’s long-term role in digital transformation is to be determined, although it’s likely to be a key player. Like other nascent technologies.... See Details Blog
Would you like to speak to an advisor? Let's Talk Cybersecurity Provide your contact information and we will follow-up shortly. Let's Browse Cybersecurity Just looking? Explore how Optiv serves its ~6,000 clients. Show me AI Security Solutions Show me the Optiv brochure Take me to Optiv's Events page Browse all Services