A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
OPTIV/SOURCE ZERO Latest news and research on red and blue team security capabilities, objective tool analysis and step-by-step solutions. The Source Zero® platform provides a space for the Optiv community to share their knowledge, research and tools. See our newest insights on subjects ranging from ethical hacking to threat intelligence to application security. Image Search Terms Type - Any -BlogToolVideo Team - Any -RedBluePurple/No Team Sort By LatestOldest Image Securing the Software Supply Chain from Typosquatting Attacks April 08, 2024 A surge in typosquatting attacks may significantly impact AI/ML development. Read how adversaries leverage OSS vulnerabilities to cause disruption. See Details Blog Image Crafting a Successful Vulnerability Management Process Framework March 26, 2024 Process makes (almost) perfect in the world of vulnerability management. Learn to build cross-functional processes to set your team up for success. See Details Blog Image Bridging the Human Gap in Vulnerability Management February 23, 2024 How can security practitioners break down communication siloes and narrow skills gaps? Learn more from a vulnerability management practice manager. See Details Blog Image Vertical Target Series: Technology, Telecommunications and Academic and Educational Services February 08, 2024 Technology companies and universities have increasingly become victims to ransomware attacks and other cybercriminal activity. Learn the latest. See Details Blog Image Navigating the Digital Landscape of Vulnerability Management February 07, 2024 How do you rationalize security tools and enhance solutions in vulnerability management? Optiv shares strategies for enhancing a VM program. See Details Blog Image Securing API Dependencies January 30, 2024 It is important to secure dependencies that can ultimately impact APIs and you as the owner. Read Optiv's guidance on tools for reviewing your SBOM.... See Details Blog Image Managing Perspectives for Assessment Reports with Few or Zero Findings January 26, 2024 When discussing an assessment report with zero findings, you can transform skepticism into a commitment to continuous improvement. Read how to do this.... See Details Blog Image Optiv’s gTIC Prioritized Software and Services List + MITRE Tactics Part IV: Microsoft Software and Products January 11, 2024 Optiv's Global Threat Intelligence Center (gTIC) highlights key vulnerabilities and threats impacting prioritized software and services. See Details Blog Image Vulnerability Management Program Fundamentals December 13, 2023 Building a vulnerability management (VM) program involves strategizing on policy, team organization and metrics. Learn how to strengthen a VM program. See Details Blog Image Optiv’s gTIC Prioritized Software and Services List + MITRE Tactics Part V: VMware Software and Products December 12, 2023 Adversaries exploit flaws in VMware software to gain initial access, achieve persistence and more. Read about these threats and techniques. See Details Blog Image Investigating an Adversary-in-the-Middle (AiTM) Phishing Email December 11, 2023 How do adversaries leverage QR codes to bypass MFA controls in phishing attacks? Learn more from red and blue teamer perspectives. See Details Blog Image gTIC Prioritized List + MITRE Tactics November 29, 2023 Optiv's® Global Threat Intelligence Center (gTIC) observed, collected, and analyzed multiple data points and information derived from Optiv's own.... See Details Blog Pagination First page « First Previous page ‹ Previous Page 1 Current page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 … Next page Next › Last page Last » Introducing Source Zero Our new technical cybersecurity thought leadership resource, Source Zero, focuses on red and blue team security capabilities, objective tools analysis, and more.
Image Securing the Software Supply Chain from Typosquatting Attacks April 08, 2024 A surge in typosquatting attacks may significantly impact AI/ML development. Read how adversaries leverage OSS vulnerabilities to cause disruption. See Details Blog
Image Crafting a Successful Vulnerability Management Process Framework March 26, 2024 Process makes (almost) perfect in the world of vulnerability management. Learn to build cross-functional processes to set your team up for success. See Details Blog
Image Bridging the Human Gap in Vulnerability Management February 23, 2024 How can security practitioners break down communication siloes and narrow skills gaps? Learn more from a vulnerability management practice manager. See Details Blog
Image Vertical Target Series: Technology, Telecommunications and Academic and Educational Services February 08, 2024 Technology companies and universities have increasingly become victims to ransomware attacks and other cybercriminal activity. Learn the latest. See Details Blog
Image Navigating the Digital Landscape of Vulnerability Management February 07, 2024 How do you rationalize security tools and enhance solutions in vulnerability management? Optiv shares strategies for enhancing a VM program. See Details Blog
Image Securing API Dependencies January 30, 2024 It is important to secure dependencies that can ultimately impact APIs and you as the owner. Read Optiv's guidance on tools for reviewing your SBOM.... See Details Blog
Image Managing Perspectives for Assessment Reports with Few or Zero Findings January 26, 2024 When discussing an assessment report with zero findings, you can transform skepticism into a commitment to continuous improvement. Read how to do this.... See Details Blog
Image Optiv’s gTIC Prioritized Software and Services List + MITRE Tactics Part IV: Microsoft Software and Products January 11, 2024 Optiv's Global Threat Intelligence Center (gTIC) highlights key vulnerabilities and threats impacting prioritized software and services. See Details Blog
Image Vulnerability Management Program Fundamentals December 13, 2023 Building a vulnerability management (VM) program involves strategizing on policy, team organization and metrics. Learn how to strengthen a VM program. See Details Blog
Image Optiv’s gTIC Prioritized Software and Services List + MITRE Tactics Part V: VMware Software and Products December 12, 2023 Adversaries exploit flaws in VMware software to gain initial access, achieve persistence and more. Read about these threats and techniques. See Details Blog
Image Investigating an Adversary-in-the-Middle (AiTM) Phishing Email December 11, 2023 How do adversaries leverage QR codes to bypass MFA controls in phishing attacks? Learn more from red and blue teamer perspectives. See Details Blog
Image gTIC Prioritized List + MITRE Tactics November 29, 2023 Optiv's® Global Threat Intelligence Center (gTIC) observed, collected, and analyzed multiple data points and information derived from Optiv's own.... See Details Blog
Would you like to speak to an advisor? Let's Talk Cybersecurity Provide your contact information and we will follow-up shortly. Let's Browse Cybersecurity Just looking? Explore how Optiv serves its ~6,000 clients. Show me AI Security Solutions Show me the Optiv brochure Take me to Optiv's Events page Browse all Services