A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Agile and Proactive Security Assessments of AWS Cloud Deployments July 11, 2018 Most companies have security personnel, but their expertise in the cloud may be limited. To have a team of highly trained AWS security experts on.... See Details Blog Image Managing Custom Roles in Azure July 05, 2018 While using Azure role-based access controls, Microsoft provides a set of built-in roles to meet the needs of providing least privileges. These roles.... See Details Blog Image The Business Trusts the Third Party – Should You? June 08, 2018 In this day and age we are faced with some hard facts within information security. One of those facts is that breaches are imminent and we must be.... See Details Blog Image Quick Tips for Building an Effective AppSec Program – Part 3 June 06, 2018 This is the last post in my series on creating an effective AppSec program within your organization. In my last post, we discussed the importance of.... See Details Blog Image Phishing - The Rest of the Story May 29, 2018 Receiving an email lure designed to trick you into clicking a phishing link and then logging into a fake website has become a common threat. In this.... See Details Blog Image Transforming Logs and Alerts into Actionable Intelligence with UEBA Functionality May 23, 2018 For information security practitioners, the stored value in security data can reduce both costs and risk. The progression of the treatment of log data.... See Details Blog Image Dear Board of Directors, It’s Time to Do the Right Thing and Elevate IAM May 17, 2018 I talk with IT executives regularly and have noticed a trend across industries that is concerning. While the threat of a data breach looms large on.... See Details Blog Image Observations on Smoke Tests – Part 3 May 09, 2018 While attending one of our technology partner’s security training courses, the instructor presented on their product’s various features and.... See Details Blog Image Getting Started with Postman for API Security Testing: Part 1 May 02, 2018 Postman is a useful tool used by many developers to document, test and interact with Application Programming Interfaces (APIs). With the ubiquity of.... See Details Blog Image Quick Tips for Building an Effective AppSec Program – Part 2 May 01, 2018 In my last blog post, I talked about what an application security (AppSec) program is and how an organization would go about building a formal program.... See Details Blog Image Thoughts on Breach of Trust vs. a Breach of Security April 25, 2018 General thought: A breach of trust is different than a breach of security. Trust and security, while related, are very different from each other. In.... See Details Blog Image Employees’ Contribution to Breach of Trust April 25, 2018 General thought: A breach of trust is different than a breach of security. Trust and security, while related, are very different from each other. In.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 42 Page 43 Page 44 Page 45 Current page 46 Page 47 Page 48 Page 49 Page 50 … Next page Next › Last page Last »
Image Agile and Proactive Security Assessments of AWS Cloud Deployments July 11, 2018 Most companies have security personnel, but their expertise in the cloud may be limited. To have a team of highly trained AWS security experts on.... See Details Blog
Image Managing Custom Roles in Azure July 05, 2018 While using Azure role-based access controls, Microsoft provides a set of built-in roles to meet the needs of providing least privileges. These roles.... See Details Blog
Image The Business Trusts the Third Party – Should You? June 08, 2018 In this day and age we are faced with some hard facts within information security. One of those facts is that breaches are imminent and we must be.... See Details Blog
Image Quick Tips for Building an Effective AppSec Program – Part 3 June 06, 2018 This is the last post in my series on creating an effective AppSec program within your organization. In my last post, we discussed the importance of.... See Details Blog
Image Phishing - The Rest of the Story May 29, 2018 Receiving an email lure designed to trick you into clicking a phishing link and then logging into a fake website has become a common threat. In this.... See Details Blog
Image Transforming Logs and Alerts into Actionable Intelligence with UEBA Functionality May 23, 2018 For information security practitioners, the stored value in security data can reduce both costs and risk. The progression of the treatment of log data.... See Details Blog
Image Dear Board of Directors, It’s Time to Do the Right Thing and Elevate IAM May 17, 2018 I talk with IT executives regularly and have noticed a trend across industries that is concerning. While the threat of a data breach looms large on.... See Details Blog
Image Observations on Smoke Tests – Part 3 May 09, 2018 While attending one of our technology partner’s security training courses, the instructor presented on their product’s various features and.... See Details Blog
Image Getting Started with Postman for API Security Testing: Part 1 May 02, 2018 Postman is a useful tool used by many developers to document, test and interact with Application Programming Interfaces (APIs). With the ubiquity of.... See Details Blog
Image Quick Tips for Building an Effective AppSec Program – Part 2 May 01, 2018 In my last blog post, I talked about what an application security (AppSec) program is and how an organization would go about building a formal program.... See Details Blog
Image Thoughts on Breach of Trust vs. a Breach of Security April 25, 2018 General thought: A breach of trust is different than a breach of security. Trust and security, while related, are very different from each other. In.... See Details Blog
Image Employees’ Contribution to Breach of Trust April 25, 2018 General thought: A breach of trust is different than a breach of security. Trust and security, while related, are very different from each other. In.... See Details Blog
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?