• Social Menu
  • Social Menu
  • Social Menu
  • Social Menu
  • Services
    • CMMC Preparation
      • CMMC Compliance Services
    • ISO 27001
      • ISO 27001 Certification
      • ISO 27001 Maintenance
      • ISO 27017 – Cloud Security for CSP’s
      • ISO 27018 – Data Privacy for CSP’s
      • ISO 27701 – Data Privacy Management System
    • SOC 2 Readiness
    • Virtual CISO (vCISO)
    • IoT Security
      • IoT Security Consulting & Assessments
    • Network Security
      • CREST Network Penetration Test
      • Vulnerability Assessment
      • Penetration Test
      • Architecture Review
    • Application Security
      • Penetration Test
      • API Penetration Testing
      • Architecture Review & Threat Assessment
    • Vendor Due Diligence
      • Accelerated Vendor Due Diligence
      • Third Party Risk Management
    • SaaS Security
    • Business Continuity
    • Blockchain Security
  • Compliance
    • CMMC
      • CMMC Compliance Services
      • DFARS Compliance
    • CCPA
    • SOC 2
    • CIS CSC
    • PCI
    • FedRAMP
    • NYDFS
    • GDPR
    • HIPAA
    • HITRUST
  • Industries
    • Legal
    • Financial
    • Government
    • Healthcare
    • More Industries
  • Resources
    • ISO 27001 Resources
      • ISO 27001 Audit & Cost Guide
      • ISO 27001 Checklist
      • ISO 27001 Cost Blog
      • ISO 27001 : Recipe & Ingredients for Certification
      • ISO 27001 Roadmap
      • ISO 27701 Cost
      • Gap Assessment Template
      • Risk Assessment Template
    • CCPA
      • CCPA Compliance Roadmap
    • CMMC
      • CMMC Certification Guide
      • CMMC C3PAO FAQs
      • CMMC Capabilities
      • CMMC Cost
      • CMMC Gap Analysis FAQs
      • CMMC Marketplace FAQs
      • SSP for CMMC
    • vCISO
      • vCISO Cost
    • FedRAMP
      • FedRAMP Cost
    • Third Party Risk Management
      • VRM Best Practice Guide for Small to Medium Businesses
    • Application Security
      • Ready for a Pen Test? Infographic
    • Business Continuity
      • BCP Table Top Exercise Template
  • About Us
    • Locations
    • Client Satisfaction
    • Giving Back
    • Jobs
    • Working at Pivot Point Security
    • PPS Partners
    • Our Stance on Inclusivity
    • The Virtual CISO Podcast
  • Blog
  • Contact Us
  • 1-888-PIVOT-POINT
    1-888-748-6876
  • info@pivotpointsecurity.com
  • 1-888-PIVOT-POINT | 1-888-748-6876
  • info@pivotpointsecurity.com
Pivot Point Security
PPS ISO 27001 Logo RPO Logo
  • Services
    • CMMC Preparation
      • CMMC Compliance Services
      • Cloud Controls Matrix
    • ISO 27001
      • ISO 27001 Certification
      • ISO 27001 Maintenance
      • ISO 27017 – Cloud Security for CSP’s
      • ISO 27018 – Data Privacy for CSP’s
      • ISO 27701 – Data Privacy Management System
    • SOC 2 Readiness
    • Virtual CISO (vCISO)
    • IoT Security
      • IoT Security Consulting & Assessments
    • Network Security
      • CREST Network Penetration Test
      • Vulnerability Assessment
      • Penetration Test
      • Architecture Review
    • Application Security
      • Penetration Test
      • API Penetration Testing
      • Architecture Review & Threat Assessment
    • Vendor Due Diligence
      • Accelerated Vendor Due Diligence
      • Third Party Risk Management
    • SaaS Security
    • Business Continuity
    • Blockchain Security
  • Compliance
    • CMMC
      • CMMC Compliance Services
      • DFARS Compliance
    • NIST SP 800-218
    • CCPA
    • SOC 2
    • CIS CSC
    • PCI
    • FedRAMP
    • GLBA
    • NYDFS
    • GDPR
    • HIPAA
    • HITRUST
  • Industries
    • Legal
    • Financial
    • Government
    • Healthcare
    • More Industries
  • Resources
    • ISO 27001
      • ISO 27001 Audit & Cost Guide
      • ISO 27001 Checklist
      • ISO 27001 Cost Blog
      • ISO 27001: Recipe & Ingredients for Certification
      • ISO 27001 Roadmap
      • ISO 27701 Cost
      • Gap Assessment Template
      • Risk Assessment Template
    • CCPA
      • CCPA Compliance Roadmap
    • CMMC
      • CMMC Assessment Checklist
      • CMMC Certification Guide
      • CMMC C3PAO FAQs
      • CMMC Capabilities
      • CMMC Cost
      • CMMC Gap Analysis FAQs
      • SSP for CMMC
      • CMMC Marketplace FAQs
    • vCISO
      • vCISO Cost
    • FedRAMP
      • FedRAMP Cost
    • Third Party Risk Management
      • VRM Best Practice Guide for Small to Medium Businesses
    • Application Security
      • Ready for a Pen Test? Infographic
    • Business Continuity
      • BCP Table Top Exercise Template
  • About Us
    • Locations
    • Client Satisfaction
    • Giving Back
    • Jobs
    • Working at Pivot Point Security
    • PPS Partners
    • Inclusivity: Our Stance & Actions
    • The Virtual CISO Podcast
  • Blog
  • Contact Us
Access The Latest Episodes from The Virtual CISO Podcast
Here’s What State-of-the-Art Entryway Security Looks Like

Here’s What State-of-the-Art Entryway Security Looks Like

by Pivot Point Security | May 27, 2022 | IoT Security

Reading Time: 3 minutes Metal detectors and other entryway security is familiar in places like airports, government buildings and some public schools. But weapons detection is increasingly needed in nontraditional settings like hospitals, churches, casinos,...
Does My Business Need Better Entryway Security?

Does My Business Need Better Entryway Security?

by Pivot Point Security | May 26, 2022 | IoT Security

Reading Time: 2 minutes Entryway security options are evolving to deal with nontraditional needs in settings like hospitals, churches and universities. At the same time, physical security technology in general is merging with cybersecurity controls as...
Why Physical Security and Cybersecurity are Converging

Why Physical Security and Cybersecurity are Converging

by Pivot Point Security | May 25, 2022 | IoT Security

Reading Time: 3 minutes These are interesting times to say the least in the cybersecurity field. One reason is that domains formerly held to be separate from cybersecurity—notably privacy—are converging under the cyber umbrella. Another major discipline...

IoT Device Security: What to Look for from Vendors

by Pivot Point Security | Mar 25, 2022 | IoT Security

Reading Time: 3 minutes         Sparked like new laws like California’s SB 327 mandating basic IoT device security, combined with growing security concerns in the market, more IoT device manufacturers are taking steps to improve...

IoT Security Guidance: What is Its Real-World Value?

by Pivot Point Security | Mar 24, 2022 | IoT Security

Reading Time: 3 minutes         In response to widespread concern about the Internet of Things (IoT) security, various guidance and legal statutes have emerged. These include comprehensive standards from trusted sources like OWASP, ENISA...

Remotely Hacking IoT Devices: Here’s How It’s Done

by Pivot Point Security | Mar 23, 2022 | IoT Security

Reading Time: 3 minutes         Because of all the software that’s generally associated with connecting to the Internet of Things (IoT) devices, it’s often preferable to compromise a device remotely to gain access to a wider attack...
« Older Entries
RSS RSS Feed

Free Downloads

  • ISO 27001 Roadmap
  • ISO 27001 Cost Guide
  • vCISO Roadmap
  • View All »

Filter Articles By Tags

Application Security application security testing CCPA cloud security CMMC CMMC Compliance compliance cyber attacks cyber security cybersecurity Data Breach data privacy GDPR Government hackers incident response information security infosec InfoSec strategies IoT IoT Security ISMS ISO 27001 ISO 27001 audit ISO 27002 ISO 27701 Malware NIST NIST 800-171 OWASP OWASP ASVS Penetration Test Phishing ransomware regulation Risk Assessment Risk Management security awareness education security awareness training SIEM SOC 2 tprm vCISO Vendor Risk Management vulnerability management

Blog Categories

  • ISO 27001 Certification
  • ISMS Consulting
  • InfoSec Risk Assessment
  • Penetration Testing
  • Ethical Hacking
  • Business Continuity Management
  • FedRamp
  • Disaster Recovery

About Us

Pivot Point Security has been architected to provide maximum levels of independent and objective information security expertise to our varied client base.

Free Resources »

Recent Blog Posts:

  • CMMC 2.0: Is Certification Worth the Cost and Risk?
  • CMMC 2.0: Choose Your Registered Provider Organization Carefully
  • CMMC 2.0: DoD Emphasizes “Nothing Has Changed” (So Why Aren’t You Ready?)
  • CFIUS Cybersecurity Considerations: Here’s What You Need to Know
white ISO 27001 logo RPO Logo
  • Home
  • Blog
  • About Pivot Point Security
  • The Virtual CISO Podcast

© 2001 - 2022 Pivot Point Security Privacy Policy | Cookie Policy | External Linking Policy | Sitemap