A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
OPTIV/SOURCE ZERO Latest news and research on red and blue team security capabilities, objective tool analysis and step-by-step solutions. The Source Zero® platform provides a space for the Optiv community to share their knowledge, research and tools. See our newest insights on subjects ranging from ethical hacking to threat intelligence to application security. Image Search Terms Type - Any -BlogToolVideo Team - Any -RedBluePurple/No Team Sort By LatestOldest Image Redirectors: A Red Teamer’s Introduction November 20, 2023 Redirectors can enable operators to restrict and control the flow of traffic to C2 servers. Learn the use cases and implementation of redirectors. See Details Blog Image Vertical Target Series: Industrials and Industrial Sub-Verticals November 03, 2023 Ransomware operators and APT groups often target organizations in the industrials vertical. Learn why in our blog. See Details Blog Image Critical Vulnerabilities Affecting Prioritized Software and Services in September 2023 October 30, 2023 Optiv's Global Threat Intelligence Center (gTIC) rounds up the top vulnerabilities impacting prioritized software and services. See Details Blog Image Fighting Cybercrime: Law Enforcement vs. Hacktivists October 20, 2023 How do law enforcement and hacktivists groups respectively approach the disruption of cybercriminal sites? Optiv highlights the key differences. See Details Blog Image The Benefits of a Cloud Security Network Architecture Review October 06, 2023 With the increased migration from on-premises to cloud environments, a cloud security network architecture review can help you solve key.... See Details Blog Image Understanding API Profiles October 03, 2023 Understanding API usage and profiles is key for an organization’s security maturity. Learn how to classify API usage, exposure, data and compliance. See Details Blog Image Secure Operations in OWASP SAMM September 26, 2023 Software operations are a key part of determining software system security. Learn to leverage OWASP SAMM to maintain the security of deployed software.... See Details Blog Image Critical Vulnerabilities Affecting Prioritized Software and Services in August 2023 September 20, 2023 Optiv's Global Threat Intelligence Center (gTIC) breaks down the latest critical vulnerabilities that your security teams should be aware of. See Details Blog Image CUDA Cores and Why They Matter for Password Cracking September 08, 2023 By making graphics cards faster each year, red teamers can crack passwords faster. Learn more about the significance of CUDA cores. See Details Blog Image Secure Software Implementation in OWASP SAMM September 08, 2023 Improving security in the SDLC's implementation phase is crucial. Read best practices for secure build, secure deployment and defect management. See Details Blog Image LOLBins Demo: The Quieter Way August 25, 2023 Adversaries can utilize native tools to remain undetected by defenders. See our demo of how red and blue teamers can enhance engagements with LOLBins. See Details Blog Image The Ever-Evolving Cyber Insurance Landscape August 16, 2023 How is the cyber insurance industry growing to meet industry demands? Learn how threat intelligence plays a role. See Details Blog Pagination First page « First Previous page ‹ Previous Page 1 Page 2 Current page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 … Next page Next › Last page Last » Introducing Source Zero Our new technical cybersecurity thought leadership resource, Source Zero, focuses on red and blue team security capabilities, objective tools analysis, and more.
Image Redirectors: A Red Teamer’s Introduction November 20, 2023 Redirectors can enable operators to restrict and control the flow of traffic to C2 servers. Learn the use cases and implementation of redirectors. See Details Blog
Image Vertical Target Series: Industrials and Industrial Sub-Verticals November 03, 2023 Ransomware operators and APT groups often target organizations in the industrials vertical. Learn why in our blog. See Details Blog
Image Critical Vulnerabilities Affecting Prioritized Software and Services in September 2023 October 30, 2023 Optiv's Global Threat Intelligence Center (gTIC) rounds up the top vulnerabilities impacting prioritized software and services. See Details Blog
Image Fighting Cybercrime: Law Enforcement vs. Hacktivists October 20, 2023 How do law enforcement and hacktivists groups respectively approach the disruption of cybercriminal sites? Optiv highlights the key differences. See Details Blog
Image The Benefits of a Cloud Security Network Architecture Review October 06, 2023 With the increased migration from on-premises to cloud environments, a cloud security network architecture review can help you solve key.... See Details Blog
Image Understanding API Profiles October 03, 2023 Understanding API usage and profiles is key for an organization’s security maturity. Learn how to classify API usage, exposure, data and compliance. See Details Blog
Image Secure Operations in OWASP SAMM September 26, 2023 Software operations are a key part of determining software system security. Learn to leverage OWASP SAMM to maintain the security of deployed software.... See Details Blog
Image Critical Vulnerabilities Affecting Prioritized Software and Services in August 2023 September 20, 2023 Optiv's Global Threat Intelligence Center (gTIC) breaks down the latest critical vulnerabilities that your security teams should be aware of. See Details Blog
Image CUDA Cores and Why They Matter for Password Cracking September 08, 2023 By making graphics cards faster each year, red teamers can crack passwords faster. Learn more about the significance of CUDA cores. See Details Blog
Image Secure Software Implementation in OWASP SAMM September 08, 2023 Improving security in the SDLC's implementation phase is crucial. Read best practices for secure build, secure deployment and defect management. See Details Blog
Image LOLBins Demo: The Quieter Way August 25, 2023 Adversaries can utilize native tools to remain undetected by defenders. See our demo of how red and blue teamers can enhance engagements with LOLBins. See Details Blog
Image The Ever-Evolving Cyber Insurance Landscape August 16, 2023 How is the cyber insurance industry growing to meet industry demands? Learn how threat intelligence plays a role. See Details Blog
Would you like to speak to an advisor? Let's Talk Cybersecurity Provide your contact information and we will follow-up shortly. Let's Browse Cybersecurity Just looking? Explore how Optiv serves its ~6,000 clients. Show me AI Security Solutions Show me the Optiv brochure Take me to Optiv's Events page Browse all Services