by Terry Crowley | Jul 3, 2019 | Penetration Testing
Reading Time: 3 minutes
Just because you moved your virtual servers, databases and/or applications to the public cloud doesn’t mean they are somehow now magically secure. You still need penetration testing to verify your cloud environment is secure and to...
by Richard Barrus | Mar 22, 2018 | InfoSec Strategies, Penetration Testing
Reading Time: 2 minutes
If your development teams have moved away from a waterfall approach to a more modern agile or DevOps methodology with frequent releases or continuous integration, how can you ensure and verify application security with just the...
by Richard Barrus | Sep 7, 2017 | InfoSec Strategies
Reading Time: 2 minutes
Pivot Point Security will soon be among the first information security firms to begin using the OWASP Application Security Verification Standard (ASVS) across its application security testing practice. As I blogged about back in...
by Richard Barrus | Apr 28, 2016 | Penetration Testing
Reading Time: 2 minutes
Pivot Point Security is always looking to enhance its web application vulnerability assessment practice in line with both client demands and new developments across both threats and countermeasures. For example, we recently began...
by Richard Barrus | Feb 4, 2016 | Penetration Testing
Reading Time: 3 minutes
As mobile devices and mobile apps have proliferated in every business and personal/consumer scenario, so has the need for mobile app security. Data accessible on mobile apps now includes not just personal or credit card/financial...