A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Part 2: Frameworks in Context: The Business-Aligned Information Security Program and Control Frameworks March 07, 2018 In part 1 of this series, we provided insights responding to the frequent question regarding control frameworks and their place in the security.... See Details Blog Image PCI Compliance Every Day – Requirement 4 March 06, 2018 In this latest post of my Payment Card Industry Data Security Standard (PCI DSS) compliance blog series, we will explore Requirement 4 of the standard.... See Details Blog Image Part 1: Frameworks in Context: The Business-Aligned Information Security Program and Control Frameworks February 27, 2018 During hundreds of strategy, risk and compliance engagements, Optiv’s consultants often have been asked very thoughtful and deep questions about.... See Details Blog Image The GDPR 90-Day Countdown is on! (No Need to Freak Out) February 25, 2018 May 25, 2018 is a day that many organizations have (or should have) marked on their calendars as a game-changing moment for their business. That’s the.... See Details Blog Image Security Simplified February 14, 2018 It's no secret that data breaches are an ugly reality for businesses today, and despite ever increasing investments, organizations seem unable to stem.... See Details Blog Image Security Lessons Learned from the Olympics February 13, 2018 The 2018 Winter Olympics opening ceremony was last Friday, opening the world stage to elite athletes competing in the latest chapter of these historic.... See Details Blog Image Using Micro-Segmentation to Protect Your Data – Part 2 February 12, 2018 While micro-segmentation, software-defined networking (SDN) and software-defined data center (SDDC) technology providers VMWare, Cisco and Amazon Web.... See Details Blog Image Unmanaged PowerShell Binaries and Endpoint Protection – Part 2 February 07, 2018 In my last blog post, I discussed the process of creating a binary that contained a reverse PowerShell payload, only it did not leverage PowerShell.... See Details Blog Image Intelligence Bulletin – When Cryptomining Attacks February 06, 2018 Optiv has seen a continuation of attacks based off the usage of CryptoNight miner, in this case likely mining Monero cryptocurrency for the attackers.... See Details Blog Image What Is SSL Web Inspection and Where Should It Occur? (Part 3) February 05, 2018 In parts one and two of this blog series, I provided an overview of SSL web inspection, and dove deeper into how SSL inspection solutions work and.... See Details Blog Image Cloud Critical Controls January 30, 2018 It’s no secret – organizations are moving to the cloud faster than their security teams can secure them. The daunting task of catching up to the.... See Details Blog Image What Is SSL Web Inspection and Where Should It Occur? (Part 2) January 28, 2018 Hardware will vary between vendors and even different models within a vendor’s catalog. Some models/vendors will offload complex CPU tasks (decryption.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 44 Page 45 Page 46 Page 47 Current page 48 Page 49 Page 50 Page 51 Page 52 … Next page Next › Last page Last »
Image Part 2: Frameworks in Context: The Business-Aligned Information Security Program and Control Frameworks March 07, 2018 In part 1 of this series, we provided insights responding to the frequent question regarding control frameworks and their place in the security.... See Details Blog
Image PCI Compliance Every Day – Requirement 4 March 06, 2018 In this latest post of my Payment Card Industry Data Security Standard (PCI DSS) compliance blog series, we will explore Requirement 4 of the standard.... See Details Blog
Image Part 1: Frameworks in Context: The Business-Aligned Information Security Program and Control Frameworks February 27, 2018 During hundreds of strategy, risk and compliance engagements, Optiv’s consultants often have been asked very thoughtful and deep questions about.... See Details Blog
Image The GDPR 90-Day Countdown is on! (No Need to Freak Out) February 25, 2018 May 25, 2018 is a day that many organizations have (or should have) marked on their calendars as a game-changing moment for their business. That’s the.... See Details Blog
Image Security Simplified February 14, 2018 It's no secret that data breaches are an ugly reality for businesses today, and despite ever increasing investments, organizations seem unable to stem.... See Details Blog
Image Security Lessons Learned from the Olympics February 13, 2018 The 2018 Winter Olympics opening ceremony was last Friday, opening the world stage to elite athletes competing in the latest chapter of these historic.... See Details Blog
Image Using Micro-Segmentation to Protect Your Data – Part 2 February 12, 2018 While micro-segmentation, software-defined networking (SDN) and software-defined data center (SDDC) technology providers VMWare, Cisco and Amazon Web.... See Details Blog
Image Unmanaged PowerShell Binaries and Endpoint Protection – Part 2 February 07, 2018 In my last blog post, I discussed the process of creating a binary that contained a reverse PowerShell payload, only it did not leverage PowerShell.... See Details Blog
Image Intelligence Bulletin – When Cryptomining Attacks February 06, 2018 Optiv has seen a continuation of attacks based off the usage of CryptoNight miner, in this case likely mining Monero cryptocurrency for the attackers.... See Details Blog
Image What Is SSL Web Inspection and Where Should It Occur? (Part 3) February 05, 2018 In parts one and two of this blog series, I provided an overview of SSL web inspection, and dove deeper into how SSL inspection solutions work and.... See Details Blog
Image Cloud Critical Controls January 30, 2018 It’s no secret – organizations are moving to the cloud faster than their security teams can secure them. The daunting task of catching up to the.... See Details Blog
Image What Is SSL Web Inspection and Where Should It Occur? (Part 2) January 28, 2018 Hardware will vary between vendors and even different models within a vendor’s catalog. Some models/vendors will offload complex CPU tasks (decryption.... See Details Blog
Would you like to speak to an advisor? Let's Talk Cybersecurity Provide your contact information and we will follow-up shortly. Let's Browse Cybersecurity Just looking? Explore how Optiv serves its ~6,000 clients. Show me AI Security Solutions Show me the Optiv brochure Take me to Optiv's Events page Browse all Services