by Pivot Point Security | Apr 22, 2022 | Application Security
Reading Time: 3 minutes
Web applications need to store tokens to help manage user sessions. Because the browser/server relationship is “stateless,” every request would otherwise require reauthentication. As a web developer, you typically have...
by Pivot Point Security | Mar 8, 2022 | InfoSec Risk Assessment
Reading Time: 2 minutes
What emerging trends will reshape the cybersecurity industry in 2022? John Verry, CISO and Managing Partner at Pivot Point Security, shares his 2022 forecast in a consultative format on a recent episode of...
by John Verry | Mar 3, 2022 | Ethical Hacking
Reading Time: 3 minutes
The rapid growth of APIs has led to significant security risks. Unless you have been marooned on an uncharted coral atoll for the last five years, you realize that the term application programming...
by John Verry | Dec 17, 2021 | Application Security
Reading Time: 2 minutes
Recent research from Akami, Imperva and others show that web application attacks have increased by up to 300% since last year, resulting in a flood of data breaches and the potential exposure of...
by Richard Barrus | Oct 27, 2021 | Application Security
Reading Time: 3 minutes
In the realm of full stack software development and DevOps, continuous change invalidates conventional, point-in-time audit/compliance evidence. But our industry has yet to bridge the gap between traditional compliance techniques and...