by Pivot Point Security | Apr 22, 2022 | InfoSec Strategies
Reading Time: 4 minutes
On March 9, 2022, the US Securities and Exchange Commission (SEC) proposed sweeping new rules (available here) to standardize and improve public companies’ disclosures on cybersecurity incident reporting, governance,...
by Pivot Point Security | Apr 22, 2022 | Cloud Security
Reading Time: 3 minutes
Leverage the leading cloud security attestation framework to achieve “provable security and compliance” for your SaaS environments As software-as-a-service (SaaS) offerings explode in popularity and...
by Pivot Point Security | Apr 4, 2022 | InfoSec Strategies
Reading Time: 3 minutes
Fleet Device Management is a leading open source device management solution built on the popular osquery open source project. The cross-platform Fleet agent runs on Windows, Linux and MacOS laptops and servers and...
by Pivot Point Security | Apr 1, 2022 | InfoSec Strategies
Reading Time: 2 minutes
Do you know what software is running on your endpoints? If not, you lack the ability to detect unauthorized applications or services, or to enforce security policies regarding unapproved software. Also, if...
by Pivot Point Security | Mar 31, 2022 | InfoSec Strategies
Reading Time: 3 minutes
Many companies already have proprietary device management solutions to protect, secure and enforce policies for devices, such as servers, laptops, tablets and phones. There are many entrants in this...