A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Machine Learning: Make Cybersecurity a Priority March 21, 2019 Organizations are investing billions in ML to try and analyze data better and improve things like decision-making or customer satisfaction. However.... See Details Blog Image All the World’s a (Digital) Stage March 20, 2019 Embarking on a digital transformation can be a significant challenge. This global digital revolution is positioned to disrupt — a market, service.... See Details Blog Image Tales from Trenches: Cybersecurity Tool Depth and Features March 14, 2019 Things we use every day may have useful, but undiscovered features. It’s the same with cybersecurity. Something you already have (appliances, software.... See Details Blog Image The Business-Centric Risk Strategy March 12, 2019 Many organizations are reaching a breaking point when it comes to the effectiveness of their cybersecurity. Security teams are overwhelmed with the.... See Details Blog Image ATT&CK Series: Discovery March 07, 2019 Modern information technology has rocketed the business sector to impressive heights, as innovative devices and software solutions are implemented.... See Details Blog Image How Can You Determine the Risk of a Threat Actor? March 05, 2019 One of the primary goals of an intelligence team is to prioritize the threats that face an organization. This includes how a particular threat actor.... See Details Blog Image Learning the Enemy Perspective February 26, 2019 Make offensive security games, and regular penetration testing part of your ongoing threat management program and your team will gain knowledge to be.... See Details Blog Image Features of a Threat Intelligence Platform February 14, 2019 A Threat Intelligence Platform (TIP) is a fantastic way to manage intelligence and its process amongst individual teams and communities, including.... See Details Blog Image Security in 2019: Getting Ahead of the Game February 07, 2019 The year 2018 was not much different than recent years in the world of security: Several massive security incidents at large companies and government.... See Details Blog Image It’s Not Always About the Perimeter – A Look at Domain Reconnaissance January 29, 2019 In this information age, security threats are commonplace and can be devastating to a business. The ability to quickly and accurately detect cyber.... See Details Blog Image IoC and IoA: Indicators of Intelligence January 24, 2019 Intelligence seems to be full of three-letter acronyms, including Indicators of Compromise (IoC) and Indicators of Attack (IoA). The difference.... See Details Blog Image Let’s Not Talk About the Past December 20, 2018 With the year quickly coming to a close, the web is full of blogs titled, “A Look Back at 2018,” and “2018: A Post-Mortem.” We’ve decided to give you.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 38 Page 39 Page 40 Page 41 Current page 42 Page 43 Page 44 Page 45 Page 46 … Next page Next › Last page Last »
Image Machine Learning: Make Cybersecurity a Priority March 21, 2019 Organizations are investing billions in ML to try and analyze data better and improve things like decision-making or customer satisfaction. However.... See Details Blog
Image All the World’s a (Digital) Stage March 20, 2019 Embarking on a digital transformation can be a significant challenge. This global digital revolution is positioned to disrupt — a market, service.... See Details Blog
Image Tales from Trenches: Cybersecurity Tool Depth and Features March 14, 2019 Things we use every day may have useful, but undiscovered features. It’s the same with cybersecurity. Something you already have (appliances, software.... See Details Blog
Image The Business-Centric Risk Strategy March 12, 2019 Many organizations are reaching a breaking point when it comes to the effectiveness of their cybersecurity. Security teams are overwhelmed with the.... See Details Blog
Image ATT&CK Series: Discovery March 07, 2019 Modern information technology has rocketed the business sector to impressive heights, as innovative devices and software solutions are implemented.... See Details Blog
Image How Can You Determine the Risk of a Threat Actor? March 05, 2019 One of the primary goals of an intelligence team is to prioritize the threats that face an organization. This includes how a particular threat actor.... See Details Blog
Image Learning the Enemy Perspective February 26, 2019 Make offensive security games, and regular penetration testing part of your ongoing threat management program and your team will gain knowledge to be.... See Details Blog
Image Features of a Threat Intelligence Platform February 14, 2019 A Threat Intelligence Platform (TIP) is a fantastic way to manage intelligence and its process amongst individual teams and communities, including.... See Details Blog
Image Security in 2019: Getting Ahead of the Game February 07, 2019 The year 2018 was not much different than recent years in the world of security: Several massive security incidents at large companies and government.... See Details Blog
Image It’s Not Always About the Perimeter – A Look at Domain Reconnaissance January 29, 2019 In this information age, security threats are commonplace and can be devastating to a business. The ability to quickly and accurately detect cyber.... See Details Blog
Image IoC and IoA: Indicators of Intelligence January 24, 2019 Intelligence seems to be full of three-letter acronyms, including Indicators of Compromise (IoC) and Indicators of Attack (IoA). The difference.... See Details Blog
Image Let’s Not Talk About the Past December 20, 2018 With the year quickly coming to a close, the web is full of blogs titled, “A Look Back at 2018,” and “2018: A Post-Mortem.” We’ve decided to give you.... See Details Blog