Subscribe To Our Daily Enewsletter:

Posts by Optiv

Machine Learning: Make Cybersecurity a Priority

Security should be built in to cover ML (machine learning) systems and connection points from end to end, Optiv explains.

Information Security Analysts: What Role Will Robots Play?

How Security Automation and Orchestration will change workloads and job tasks for information security analysts, according to Optiv.

Future-Proof your Business with Identity-Centric Security

Creating and executing a truly identity-centric security strategy is more subjective than just “block” or “allow.” Optiv Security describes a IAM path to success.

How to Evaluate Threat Intelligence Platform Features, Capabilities

Here are eight threat intelligence platform (TIP) capabilities to contrast & consider when comparing vendors, according to Optiv Security.

IoC and IoA: Indicators of Intelligence

Indicators of Compromise (IoC), Indicators of Attack (IoA) and what it all means for modern cybersecurity strategies, according to Optiv’s Ken Dunham.

SecOps vs. DevOps in the Information Age

How SecOps and DevOps work together or compete with one another, is essential towards a successful business transformation. Optiv Security explains.

Five Security Best Practices for Serverless Applications

A serverless architecture offers scalability benefits but also introduces unique security risks. Optiv Security explains the issues and five tips to mitigate risk.

Outsourced Business Functions: Should You Trust that Third-Party?

Information security organizations must evolve to support outsourced business services and partner ecosystems — which increase the probability of a breach. Optiv Security explains the modern-day risks and mitigation strategies.

SDN: How Micro-Segmentation Can Protect Data – Part 2 of 2

Firewalls, enhanced workload visibility and automated deception/incident response (IR) solutions integrate with software-defined networking (SDN) and software-defined data center (SDDC) solutions. Optiv Security explains why.

SDN: How Micro-Segmentation Can Protect Data – Part 1 of 2

As software-defined networking (SDN) technologies become more prevalent, micro-segmentation is emerging as a critical step for security in virtualized environments. Optiv Security explains why.