A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image KRACK - What you need to know about Key Reinstallation AttaCKs October 23, 2017 On Monday, October 16, researchers announced the discovery of several vulnerabilities within the wireless protocol WPA and WPA2. The details of these.... See Details Blog Image Cybersecurity Careers October 22, 2017 2017 has been a very busy year for cybersecurity professionals. It seems weekly, if not daily, news breaks of a new data breach or intrusion of.... See Details Blog Image PCI Compliance Every Day – Requirement 11 October 18, 2017 The most widely known requirements in PCI DSS 3.2 section 11 with a timing implication are the quarterly external and internal vulnerability scans (11.... See Details Blog Image Criminals Often Prey on Victims… Know the Top 5 Things to Protect Yourself October 17, 2017 Criminals oftentimes utilize current events (natural disasters, large data breaches, public massacres, terrorist attacks, etc.) to target not just the.... See Details Blog Image Predictions for Tomorrow’s Internet October 16, 2017 Currently, an estimated 6.4 billion Internet-of-Things (IoT) devices are connected, with 67 percent residing in North America, Western Europe and.... See Details Blog Image Cybersecurity Awareness: Take Control of Your Identity October 12, 2017 October is National Cybersecurity Awareness Month; the annual campaign led by the U.S. Department of Homeland Security that seeks to raise awareness.... See Details Blog Image From the Boardroom to the Breakroom: Cybersecurity in the Workplace October 10, 2017 Key steps to cybersecurity in the workplace include establishing and maintaining a “security culture” in which company networks and the data they hold.... See Details Blog Image Avoid User in Training October 05, 2017 Often when I’m onsite with clients, gathering requirements for an identity and access management (IAM) solution implementation, I’m asked, “What are.... See Details Blog Image Online Safety - Simple Steps October 02, 2017 From cyber bullying to obtaining personal and sensitive information through phishing campaigns, harm lurks in many corners of the Internet. With a few.... See Details Blog Image Being Certain about Estimative Uncertainty September 26, 2017 I love it when my teenager says something like, “You know Dad, that’s how they designed it,” when in fact, my child does not have any evidence to.... See Details Blog Image DDoS Threats: Are Your Third Parties Protecting You? September 24, 2017 There’s evidence that ransomware may be evolving beyond holding data hostage. In recent news, DDoS attacks were used as a threat against organizations.... See Details Blog Image A Day in the Life of Optiv Cyber Security Superheroes: Optiv Worldwide September 21, 2017 Deemed the “Silicon Valley of India,” Bangalore is a major hub for many of the top multinational information technology firms, software companies, and.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 47 Page 48 Page 49 Page 50 Current page 51 Page 52 Page 53 Page 54 Page 55 … Next page Next › Last page Last »
Image KRACK - What you need to know about Key Reinstallation AttaCKs October 23, 2017 On Monday, October 16, researchers announced the discovery of several vulnerabilities within the wireless protocol WPA and WPA2. The details of these.... See Details Blog
Image Cybersecurity Careers October 22, 2017 2017 has been a very busy year for cybersecurity professionals. It seems weekly, if not daily, news breaks of a new data breach or intrusion of.... See Details Blog
Image PCI Compliance Every Day – Requirement 11 October 18, 2017 The most widely known requirements in PCI DSS 3.2 section 11 with a timing implication are the quarterly external and internal vulnerability scans (11.... See Details Blog
Image Criminals Often Prey on Victims… Know the Top 5 Things to Protect Yourself October 17, 2017 Criminals oftentimes utilize current events (natural disasters, large data breaches, public massacres, terrorist attacks, etc.) to target not just the.... See Details Blog
Image Predictions for Tomorrow’s Internet October 16, 2017 Currently, an estimated 6.4 billion Internet-of-Things (IoT) devices are connected, with 67 percent residing in North America, Western Europe and.... See Details Blog
Image Cybersecurity Awareness: Take Control of Your Identity October 12, 2017 October is National Cybersecurity Awareness Month; the annual campaign led by the U.S. Department of Homeland Security that seeks to raise awareness.... See Details Blog
Image From the Boardroom to the Breakroom: Cybersecurity in the Workplace October 10, 2017 Key steps to cybersecurity in the workplace include establishing and maintaining a “security culture” in which company networks and the data they hold.... See Details Blog
Image Avoid User in Training October 05, 2017 Often when I’m onsite with clients, gathering requirements for an identity and access management (IAM) solution implementation, I’m asked, “What are.... See Details Blog
Image Online Safety - Simple Steps October 02, 2017 From cyber bullying to obtaining personal and sensitive information through phishing campaigns, harm lurks in many corners of the Internet. With a few.... See Details Blog
Image Being Certain about Estimative Uncertainty September 26, 2017 I love it when my teenager says something like, “You know Dad, that’s how they designed it,” when in fact, my child does not have any evidence to.... See Details Blog
Image DDoS Threats: Are Your Third Parties Protecting You? September 24, 2017 There’s evidence that ransomware may be evolving beyond holding data hostage. In recent news, DDoS attacks were used as a threat against organizations.... See Details Blog
Image A Day in the Life of Optiv Cyber Security Superheroes: Optiv Worldwide September 21, 2017 Deemed the “Silicon Valley of India,” Bangalore is a major hub for many of the top multinational information technology firms, software companies, and.... See Details Blog
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?