A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Will Blockchain Change the World? October 23, 2018 There has been a lot of hype around “blockchain” these past few months. After attending sessions, discussing it with others, and researching how it is.... See Details Blog Image Reading Obscure Memory October 18, 2018 Extracting data from memory chips is always an exciting part of any hardware assessment. I have a few chip readers at my disposal which can do the.... See Details Blog Image The Payment Transformation October 16, 2018 It’s important to understand the perspective of both the business and the security leader. Merchants invest heavily in PCI compliance and it’s money.... See Details Blog Image Keeping Credentials Safe: Worldwide in Real-Time October 15, 2018 If you were to gather ten cyber security experts in a room and ask them what the most common threat actor access point is for today’s enterprise.... See Details Blog Image Lessons on Proactive Incident Management From… the Packers? October 10, 2018 Fantasy football and information security have more in common than you think. Both are all about planning, scenarios and virtual practice. But the.... See Details Blog Image Caught Between a ROC and a Hard Place October 09, 2018 It’s important to understand the perspective of both the business and the security leader. Merchants invest heavily in PCI compliance and it’s money.... See Details Blog Image 3 Key Ways To Improve Your Incident Response October 08, 2018 As attack surfaces expand it is critical for enterprises to develop and implement a proactive incident response (IR) plan that combats an increasing.... See Details Blog Image ATT&CK’s Initial Access Adversarial Tactic October 05, 2018 By far the best way to prevent a security incident is to prevent the initial access from being obtained in the first place. This is why organizations.... See Details Blog Image Inside and Outside the Cardholder Data Environment October 04, 2018 Businesses have spent an enormous amount of money on PCI compliance. It is time to leverage these existing investments and expand them to include.... See Details Blog Image Do You Know Where Your Evidence Is? October 03, 2018 In part three of our series focused on the Enemy Perspective, we’ll focus on an important element of incident response: digital forensics.... See Details Blog Image Staying Cyber Safe During Digital Transformation October 01, 2018 It’s October and that means National Cybersecurity Awareness Month (NCSAM) is upon us. This annual initiative raises awareness about the importance of.... See Details Blog Image Intro to Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™ Series) September 28, 2018 This series is focused on the risk associated with attacks which leverage vulnerabilities that could have been mitigated through the implementation of.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 40 Page 41 Page 42 Page 43 Current page 44 Page 45 Page 46 Page 47 Page 48 … Next page Next › Last page Last »
Image Will Blockchain Change the World? October 23, 2018 There has been a lot of hype around “blockchain” these past few months. After attending sessions, discussing it with others, and researching how it is.... See Details Blog
Image Reading Obscure Memory October 18, 2018 Extracting data from memory chips is always an exciting part of any hardware assessment. I have a few chip readers at my disposal which can do the.... See Details Blog
Image The Payment Transformation October 16, 2018 It’s important to understand the perspective of both the business and the security leader. Merchants invest heavily in PCI compliance and it’s money.... See Details Blog
Image Keeping Credentials Safe: Worldwide in Real-Time October 15, 2018 If you were to gather ten cyber security experts in a room and ask them what the most common threat actor access point is for today’s enterprise.... See Details Blog
Image Lessons on Proactive Incident Management From… the Packers? October 10, 2018 Fantasy football and information security have more in common than you think. Both are all about planning, scenarios and virtual practice. But the.... See Details Blog
Image Caught Between a ROC and a Hard Place October 09, 2018 It’s important to understand the perspective of both the business and the security leader. Merchants invest heavily in PCI compliance and it’s money.... See Details Blog
Image 3 Key Ways To Improve Your Incident Response October 08, 2018 As attack surfaces expand it is critical for enterprises to develop and implement a proactive incident response (IR) plan that combats an increasing.... See Details Blog
Image ATT&CK’s Initial Access Adversarial Tactic October 05, 2018 By far the best way to prevent a security incident is to prevent the initial access from being obtained in the first place. This is why organizations.... See Details Blog
Image Inside and Outside the Cardholder Data Environment October 04, 2018 Businesses have spent an enormous amount of money on PCI compliance. It is time to leverage these existing investments and expand them to include.... See Details Blog
Image Do You Know Where Your Evidence Is? October 03, 2018 In part three of our series focused on the Enemy Perspective, we’ll focus on an important element of incident response: digital forensics.... See Details Blog
Image Staying Cyber Safe During Digital Transformation October 01, 2018 It’s October and that means National Cybersecurity Awareness Month (NCSAM) is upon us. This annual initiative raises awareness about the importance of.... See Details Blog
Image Intro to Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™ Series) September 28, 2018 This series is focused on the risk associated with attacks which leverage vulnerabilities that could have been mitigated through the implementation of.... See Details Blog