A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Quick Tips for Building an Effective AppSec Program – Part 1 April 10, 2018 An application security (AppSec) program can be defined as the set of risk mitigating controls and business functions that support the discovery.... See Details Blog Image Escape and Evasion Egressing Restricted Networks – Part 2 April 02, 2018 Attackers and security assessors alike are utilizing a technique called domain fronting, which masks malicious command and control (C2) traffic. This.... See Details Blog Image Mobile App Testing With Automation Trickery in Frida March 29, 2018 When you spend a lot of time doing security testing on mobile apps like I do, you begin to worry that a large part of your life will be spent.... See Details Blog Image Get Control of the Mayhem: A Day in the Life of a Piece of Unstructured Sensitive Data March 21, 2018 Sensitive and relevant data, such as personally identifiable information (PII) or intellectual property, may be running rampant in your organization.... See Details Blog Image Intelligence Bulletin – MinionGhost Reemerges March 21, 2018 At approximately 9:30am EDT on 20 March 2018, hacktivist collective, MinionGhost, announced planned cyber attacks against unspecified Asian entities.... See Details Blog Image Pass-the-Hash March 14, 2018 Pass-the-hash (PtH) is an all too common form of credentials attack, especially since the advent of a tool called Mimikatz. Using PtH to extract from.... See Details Blog Image Observations on Smoke Tests – Part 1 March 13, 2018 Smoke testing in the traditional definition is most often used to assess the functionality of key software features to determine if they work or.... See Details Blog Image Part 2: Frameworks in Context: The Business-Aligned Information Security Program and Control Frameworks March 07, 2018 In part 1 of this series, we provided insights responding to the frequent question regarding control frameworks and their place in the security.... See Details Blog Image PCI Compliance Every Day – Requirement 4 March 06, 2018 In this latest post of my Payment Card Industry Data Security Standard (PCI DSS) compliance blog series, we will explore Requirement 4 of the standard.... See Details Blog Image Part 1: Frameworks in Context: The Business-Aligned Information Security Program and Control Frameworks February 27, 2018 During hundreds of strategy, risk and compliance engagements, Optiv’s consultants often have been asked very thoughtful and deep questions about.... See Details Blog Image The GDPR 90-Day Countdown is on! (No Need to Freak Out) February 25, 2018 May 25, 2018 is a day that many organizations have (or should have) marked on their calendars as a game-changing moment for their business. That’s the.... See Details Blog Image Security Simplified February 14, 2018 It's no secret that data breaches are an ugly reality for businesses today, and despite ever increasing investments, organizations seem unable to stem.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 43 Page 44 Page 45 Page 46 Current page 47 Page 48 Page 49 Page 50 Page 51 … Next page Next › Last page Last »
Image Quick Tips for Building an Effective AppSec Program – Part 1 April 10, 2018 An application security (AppSec) program can be defined as the set of risk mitigating controls and business functions that support the discovery.... See Details Blog
Image Escape and Evasion Egressing Restricted Networks – Part 2 April 02, 2018 Attackers and security assessors alike are utilizing a technique called domain fronting, which masks malicious command and control (C2) traffic. This.... See Details Blog
Image Mobile App Testing With Automation Trickery in Frida March 29, 2018 When you spend a lot of time doing security testing on mobile apps like I do, you begin to worry that a large part of your life will be spent.... See Details Blog
Image Get Control of the Mayhem: A Day in the Life of a Piece of Unstructured Sensitive Data March 21, 2018 Sensitive and relevant data, such as personally identifiable information (PII) or intellectual property, may be running rampant in your organization.... See Details Blog
Image Intelligence Bulletin – MinionGhost Reemerges March 21, 2018 At approximately 9:30am EDT on 20 March 2018, hacktivist collective, MinionGhost, announced planned cyber attacks against unspecified Asian entities.... See Details Blog
Image Pass-the-Hash March 14, 2018 Pass-the-hash (PtH) is an all too common form of credentials attack, especially since the advent of a tool called Mimikatz. Using PtH to extract from.... See Details Blog
Image Observations on Smoke Tests – Part 1 March 13, 2018 Smoke testing in the traditional definition is most often used to assess the functionality of key software features to determine if they work or.... See Details Blog
Image Part 2: Frameworks in Context: The Business-Aligned Information Security Program and Control Frameworks March 07, 2018 In part 1 of this series, we provided insights responding to the frequent question regarding control frameworks and their place in the security.... See Details Blog
Image PCI Compliance Every Day – Requirement 4 March 06, 2018 In this latest post of my Payment Card Industry Data Security Standard (PCI DSS) compliance blog series, we will explore Requirement 4 of the standard.... See Details Blog
Image Part 1: Frameworks in Context: The Business-Aligned Information Security Program and Control Frameworks February 27, 2018 During hundreds of strategy, risk and compliance engagements, Optiv’s consultants often have been asked very thoughtful and deep questions about.... See Details Blog
Image The GDPR 90-Day Countdown is on! (No Need to Freak Out) February 25, 2018 May 25, 2018 is a day that many organizations have (or should have) marked on their calendars as a game-changing moment for their business. That’s the.... See Details Blog
Image Security Simplified February 14, 2018 It's no secret that data breaches are an ugly reality for businesses today, and despite ever increasing investments, organizations seem unable to stem.... See Details Blog