A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Data is the New Currency September 26, 2018 In today’s digital world, data is currency. Nowhere does this phenomenon show itself more clearly than in the world of payment transactions. Payment.... See Details Blog Image The Necessity of Enemy Perspectives: The Enemy Gets a Vote September 21, 2018 The enemy gets a vote. The current Secretary of Defense and retired Marine Corps General James Mattis is fond of this observation. However, in many.... See Details Blog Image Intelligence Bulletin – India Hiring Proxy September 18, 2018 On June 4, 2018, Optiv gTIC Human Intelligence (HUMINT) cell contacted an India-based individual providing interview-proxy services for job applicants.... See Details Blog Image Skills Gap – Hiring When There’s No People September 13, 2018 While part of the solution to a robust and complete security program is security automation and orchestration (SAO), do not forget that hackers are.... See Details Blog Image Getting Started with Postman for API Security Testing: Part 2 September 06, 2018 Postman is a useful tool used by many developers to document, test and interact with Application Programming Interfaces (APIs). This post will explore.... See Details Blog Image We Want Robots to Do (Part of) Our Job September 05, 2018 The job of an information security analyst today is rife with repetitive, sometimes mundane tasks that are performed based on the analyst’s best.... See Details Blog Image Gaining Efficiencies in a Cybersecurity Ecosystem August 28, 2018 In cybersecurity, with threat attack surfaces growing larger each day because of cloud, mobile, social media and IoT, it’s harder than ever to keep.... See Details Blog Image Security Operations Efficiency is Not Gained Through a Patchwork of Expensive Security Tools August 28, 2018 Cloud, mobile, social media, IoT and big data have profoundly expanded the attack surface in the latest cyber super cycle, and it’s no surprise.... See Details Blog Image Agile and Proactive Security Assessments of AWS Cloud Deployments July 11, 2018 Most companies have security personnel, but their expertise in the cloud may be limited. To have a team of highly trained AWS security experts on.... See Details Blog Image Managing Custom Roles in Azure July 05, 2018 While using Azure role-based access controls, Microsoft provides a set of built-in roles to meet the needs of providing least privileges. These roles.... See Details Blog Image The Business Trusts the Third Party – Should You? June 08, 2018 In this day and age we are faced with some hard facts within information security. One of those facts is that breaches are imminent and we must be.... See Details Blog Image Quick Tips for Building an Effective AppSec Program – Part 3 June 06, 2018 This is the last post in my series on creating an effective AppSec program within your organization. In my last post, we discussed the importance of.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 41 Page 42 Page 43 Page 44 Current page 45 Page 46 Page 47 Page 48 Page 49 … Next page Next › Last page Last »
Image Data is the New Currency September 26, 2018 In today’s digital world, data is currency. Nowhere does this phenomenon show itself more clearly than in the world of payment transactions. Payment.... See Details Blog
Image The Necessity of Enemy Perspectives: The Enemy Gets a Vote September 21, 2018 The enemy gets a vote. The current Secretary of Defense and retired Marine Corps General James Mattis is fond of this observation. However, in many.... See Details Blog
Image Intelligence Bulletin – India Hiring Proxy September 18, 2018 On June 4, 2018, Optiv gTIC Human Intelligence (HUMINT) cell contacted an India-based individual providing interview-proxy services for job applicants.... See Details Blog
Image Skills Gap – Hiring When There’s No People September 13, 2018 While part of the solution to a robust and complete security program is security automation and orchestration (SAO), do not forget that hackers are.... See Details Blog
Image Getting Started with Postman for API Security Testing: Part 2 September 06, 2018 Postman is a useful tool used by many developers to document, test and interact with Application Programming Interfaces (APIs). This post will explore.... See Details Blog
Image We Want Robots to Do (Part of) Our Job September 05, 2018 The job of an information security analyst today is rife with repetitive, sometimes mundane tasks that are performed based on the analyst’s best.... See Details Blog
Image Gaining Efficiencies in a Cybersecurity Ecosystem August 28, 2018 In cybersecurity, with threat attack surfaces growing larger each day because of cloud, mobile, social media and IoT, it’s harder than ever to keep.... See Details Blog
Image Security Operations Efficiency is Not Gained Through a Patchwork of Expensive Security Tools August 28, 2018 Cloud, mobile, social media, IoT and big data have profoundly expanded the attack surface in the latest cyber super cycle, and it’s no surprise.... See Details Blog
Image Agile and Proactive Security Assessments of AWS Cloud Deployments July 11, 2018 Most companies have security personnel, but their expertise in the cloud may be limited. To have a team of highly trained AWS security experts on.... See Details Blog
Image Managing Custom Roles in Azure July 05, 2018 While using Azure role-based access controls, Microsoft provides a set of built-in roles to meet the needs of providing least privileges. These roles.... See Details Blog
Image The Business Trusts the Third Party – Should You? June 08, 2018 In this day and age we are faced with some hard facts within information security. One of those facts is that breaches are imminent and we must be.... See Details Blog
Image Quick Tips for Building an Effective AppSec Program – Part 3 June 06, 2018 This is the last post in my series on creating an effective AppSec program within your organization. In my last post, we discussed the importance of.... See Details Blog