A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Search Terms Topic of Interest - Any -AppSecArchitecture and ImplementationBenefitsBig Data and AnalyticsBusiness/StrategyCloud SecurityCommentaryConsumer Financial Protection Agency (CFPA)CultureCyber Digital TransformationCyber OperationsCybersecurityCybersecurity AcronymsCybersecurity Awareness MonthCybersummitData Protection and Data PrivacyDeepfakesDigital IntelligenceDigital TransformationEducation and AwarenessEducation/IntelligenceGovernanceHealthcareIdentity and Access ManagementIncident ManagementIndustryIndustry AnalysisInfographicInnovationInternet of ThingsManaged Security ServicesOperational TechnologyOpinionOptivOptiv CorporateOptivConPartnershipPassword Security and HygienePhishingRegulatory/LegalRisk and ComplianceSecOpsSecurity OperationsSecurity Program StrategyServicesSolution and Program InsightSolutionsSource ZeroStaffingTalent AcquisitionTaniumTaniumTechnicalTechnical ContentTechnical InnovatorTechnical ResearchThought LeadershipThreats and VulnerabilitiesToolsZero Trust Sort By LatestOldest Image Petya / Petna / NotPetya Ransomware Recommendations from the Trenches June 28, 2017 Here we go again. Not long ago I updated a blog post containing actionable recommendations to protect your environment from ransomware threats.... See Details Blog Image The Most Important Threats for Your Organization to Watch June 26, 2017 The Optiv Cyber Threat Intelligence Estimate 2017 is a yearly report that reviews important events of the past calendar year, and uses them to make.... See Details Blog Image Intelligence Advisory – New Petya Ransomware Outbreak June 26, 2017 Optiv’s Global Threat Intelligence Center (gTIC) received reports from several sources concerning a recent modification to the Petya ransomware strain.... See Details Blog Image What Changes will EO 13800 Bring to Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure? June 21, 2017 Anyone who has held the position of CIO or CISO in a government agency or bureau can tell you implementing an effective information risk management.... See Details Blog Image Cyber Threat Intelligence – Putting out Fires or Firefighting? June 19, 2017 When it comes to fighting malware, combating nation-state threats, and securing digital assets, the information security industry has much to learn.... See Details Blog Image Implementing an Identity Centric Approach June 18, 2017 With the latest Verizon Data Breach Incident Report finding that 81 percent of hacking related breaches leveraged either stolen and/or weak passwords.... See Details Blog Image Thank You for the Help! June 14, 2017 One of the more influential things in my life that directed me towards a career in information security was the 1983 movie, WarGames. I was already a.... See Details Blog Image Risk Management and Intelligence: What is Your End Game? May 30, 2017 Anyone worth their salt in the world of cyber threat intelligence is always focused on the actionable outcome – how can I lower my business risk by.... See Details Blog Image Having an Identity Crisis? CISO’s Need to Own IAM May 24, 2017 Within any company, we can find owners for every key function throughout the enterprise. If we ask, “who is in charge of human resources?” we know the.... See Details Blog Image Three Steps for Management and Remediation of Security Vulnerabilities with Third Parties May 23, 2017 Over the years, security organizations have had to deal with many vulnerabilities that required quick response and remediation. Some examples that.... See Details Blog Image Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 19 May 21, 2017 Protect the organization’s information, as well as its reputation, by developing and implementing an incident response infrastructure (e.g. plans.... See Details Blog Image What We Look for When Staffing Cyber Security Positions May 17, 2017 It’s a well-known fact that there is a talent gap in the security industry. There are simply not enough qualified people to staff the positions in our.... See Details Blog Pagination First page « First Previous page ‹ Previous … Page 49 Page 50 Page 51 Page 52 Current page 53 Page 54 Page 55 Page 56 Page 57 … Next page Next › Last page Last »
Image Petya / Petna / NotPetya Ransomware Recommendations from the Trenches June 28, 2017 Here we go again. Not long ago I updated a blog post containing actionable recommendations to protect your environment from ransomware threats.... See Details Blog
Image The Most Important Threats for Your Organization to Watch June 26, 2017 The Optiv Cyber Threat Intelligence Estimate 2017 is a yearly report that reviews important events of the past calendar year, and uses them to make.... See Details Blog
Image Intelligence Advisory – New Petya Ransomware Outbreak June 26, 2017 Optiv’s Global Threat Intelligence Center (gTIC) received reports from several sources concerning a recent modification to the Petya ransomware strain.... See Details Blog
Image What Changes will EO 13800 Bring to Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure? June 21, 2017 Anyone who has held the position of CIO or CISO in a government agency or bureau can tell you implementing an effective information risk management.... See Details Blog
Image Cyber Threat Intelligence – Putting out Fires or Firefighting? June 19, 2017 When it comes to fighting malware, combating nation-state threats, and securing digital assets, the information security industry has much to learn.... See Details Blog
Image Implementing an Identity Centric Approach June 18, 2017 With the latest Verizon Data Breach Incident Report finding that 81 percent of hacking related breaches leveraged either stolen and/or weak passwords.... See Details Blog
Image Thank You for the Help! June 14, 2017 One of the more influential things in my life that directed me towards a career in information security was the 1983 movie, WarGames. I was already a.... See Details Blog
Image Risk Management and Intelligence: What is Your End Game? May 30, 2017 Anyone worth their salt in the world of cyber threat intelligence is always focused on the actionable outcome – how can I lower my business risk by.... See Details Blog
Image Having an Identity Crisis? CISO’s Need to Own IAM May 24, 2017 Within any company, we can find owners for every key function throughout the enterprise. If we ask, “who is in charge of human resources?” we know the.... See Details Blog
Image Three Steps for Management and Remediation of Security Vulnerabilities with Third Parties May 23, 2017 Over the years, security organizations have had to deal with many vulnerabilities that required quick response and remediation. Some examples that.... See Details Blog
Image Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 19 May 21, 2017 Protect the organization’s information, as well as its reputation, by developing and implementing an incident response infrastructure (e.g. plans.... See Details Blog
Image What We Look for When Staffing Cyber Security Positions May 17, 2017 It’s a well-known fact that there is a talent gap in the security industry. There are simply not enough qualified people to staff the positions in our.... See Details Blog