Pivot Point Security
  • Services
    CMMC Preparation
    ISO 27001
    SOC 2 Readiness
    Internal Audit
    Virtual CISO (vCISO)
    IoT Security
    Network Security
    Application Security
    Vendor Due Diligence
    SaaS Security
    Busi n ess C ontinui t y Business Continuity
    Blockchain Security
    SCA
  • Compliance
    CMMC
    NIST SP 800-218
    CCPA
    SOC 2
    CIS C SC CIS CSC
    PCI
    FedRAMP
    GLBA
    NYDFS
    GDPR
    HIPAA
    HITRUST
    TISAX
  • Insights
    Podcasts
    Resources
    Blog
    Security Education
  • About Pivot Point Security
    About Us
    Leadership
    Jobs
    Locations
    Partner With Us
Contact Us
pivotpoint logo.png
Menu

Posts by Richard Barrus

FedRAMP Tailored
10 Mar
ISMS Consulting

What is FedRAMP Tailored and Who Does It Apply To?

  • March 16, 2023
  • By author-avatar Richard Barrus
FedRAMP, the Federal Risk and Authorization Management Program, is the gateway to selling cloud services to US government agencies. To ...

Continue reading

pivot blog
13 Jan
Cybersecurity Maturity Model Certification (CMMC)

CMMC Rulemaking Changes Again—What’s the Timeline Now?

  • January 13, 2023
  • By author-avatar Richard Barrus
CMMC Rulemaking Changes Again—What’s the Timeline Now? The US Department of Defense (DoD) has consistently asserted that federal rulem...

Continue reading

CMMC NIST
02 Mar
Compliance, Cybersecurity, Cybersecurity Maturity Model Certification (CMMC)

CMMC 2.0 and NIST 800-171—Pressure from Primes Could Accelerate Compliance Timeframes

  • March 16, 2023
  • By author-avatar Richard Barrus
Many organizations in the US defense industrial base (DIB) that handle Controlled Unclassified Information (CUI) have been working towa...

Continue reading

Incident response
02 Feb
Compliance, Cybersecurity, SIEM

Can Attack Surface Management Help with Incident Response?

  • March 16, 2023
  • By author-avatar Richard Barrus
Modern attack surface management techniques are increasingly seen as critical to identify and mitigate emerging attacks and risks acros...

Continue reading

vulnerability assessment
01 Feb
Application Security

Can Attack Surface Management Help with Vulnerability Assessment?

  • March 16, 2023
  • By author-avatar Richard Barrus
It seems like every week a new vulnerability surfaces that organizations need to be concerned about, evaluate and potentially address. ...

Continue reading

  • 1
  • 2
  • 3
  • ›
  • »
footerPerson 1

How can we help you?

Have a question? Click the button below to contact us. We will reply as soon as possible.
Contact Us
PPS Logo Color 1 min
ISO 27001 certification Icon WHITE 1 min
CMMC Compliance RPO Logo
ErPsTawi

Copyright 2023 Pivot Point Security. All Rights Reserved.

Privacy Policy | Cookie Policy | External Linking Policy | Sitemap

  • Services
    • CMMC Preparation
      • CMMC Compliance Services
      • Cloud Controls Matrix
    • ISO 27001
      • ISO 27001 Certification
      • ISO 27001 Maintenance
      • ISO 27017 – Cloud Security for CSP’s
      • ISO 27018 – Data Privacy for CSP’s
      • ISO 27701 – Data Privacy Management System
    • SOC 2 Readiness
    • Virtual CISO (vCISO)
    • IoT Security
      • IoT Security Consulting & Assessments
    • Network Security
      • CREST Network Penetration Test
      • Vulnerability Assessment
      • Penetration Test
      • Architecture Review
    • Application Security
      • Penetration Test
      • API Penetration Testing
      • Architecture Review & Threat Assessment
    • Vendor Due Diligence
      • Accelerated Vendor Due Diligence
      • Third Party Risk Management
    • SaaS Security
    • Business Continuity
    • Blockchain Security
    • SCA
  • Compliance
    • CMMC
      • CMMC Compliance Services
      • DFARS Compliance
    • CCPA
    • SOC 2
    • CIS CSC
    • PCI
    • FedRAMP
    • NYDFS
    • GDPR
    • HIPAA
    • HITRUST
    • TISAX
  • Industries
    • Legal
    • Financial
    • Government
    • Healthcare
    • More Industries
  • Resources
    • ISO 27001 Resources
      • ISO 27001 Audit & Cost Guide
      • ISO 27001 Checklist
      • ISO 27001 Cost Blog
      • ISO 27001 : Recipe & Ingredients for Certification
      • ISO 27001 Roadmap
      • ISO 27701 Cost
      • Gap Assessment Template
      • Risk Assessment Template
    • CCPA
      • CCPA Compliance Roadmap
    • CMMC
      • CMMC Assessment Checklist
      • CMMC Certification Guide
      • CMMC C3PAO FAQs
      • CMMC Capabilities
      • CMMC Cost
      • CMMC Gap Analysis FAQs
      • SSP for CMMC
      • CMMC Marketplace FAQs
    • vCISO
      • vCISO Cost
    • FedRAMP
      • FedRAMP Cost
    • Third Party Risk Management
      • VRM Best Practice Guide for Small to Medium Businesses
    • Application Security
      • Ready for a Pen Test? Infographic
    • Business Continuity
      • BCP Table Top Exercise Template
  • Insights
    • Podcasts
    • Resources
    • Blog
  • About Us
    • Locations
    • Client Satisfaction
    • Giving Back
    • Jobs
    • Working at Pivot Point Security
    • PPS Partners
  • Blog
  • Contact Us