Posts by Optiv

Enterprise Security Operations: 3 Areas to Focus

Credit: Pixabay

How to focus your remote end-users on proper email security, tool configuration and chat interactions. Optiv Security explains.

California Consumer Privacy Act (CCPA): What You Need to Know

Eight steps organizations should take before CCPA (California Consumer Privacy Act) enforcement begins, according to Optiv Security.

Zero Trust Security Explained

The Zero Trust information security model is gaining popularity for three key reasons, Optiv Security explains.

Measuring Cybersecurity ROI Part 2: Cost Savings, Decreasing M&A Risk

Proper cybersecurity dramatically reduces the risk associated with mergers and acquisitions, Optiv Security explains.

Measuring Cybersecurity ROI Part 1: The Value of Mitigating Risk

Security leads need to articulate the value of their operations to leadership. Optiv explains how to get started.

Machine Learning: Make Cybersecurity a Priority

Security should be built in to cover ML (machine learning) systems and connection points from end to end, Optiv explains.

Information Security Analysts: What Role Will Robots Play?

How Security Automation and Orchestration will change workloads and job tasks for information security analysts, according to Optiv.

Future-Proof your Business with Identity-Centric Security

Creating and executing a truly identity-centric security strategy is more subjective than just “block” or “allow.” Optiv Security describes a IAM path to success.

How to Evaluate Threat Intelligence Platform Features, Capabilities

Here are eight threat intelligence platform (TIP) capabilities to contrast & consider when comparing vendors, according to Optiv Security.

IoC and IoA: Indicators of Intelligence

Indicators of Compromise (IoC), Indicators of Attack (IoA) and what it all means for modern cybersecurity strategies, according to Optiv’s Ken Dunham.