by Pivot Point Security | Apr 22, 2022 | Cloud Security
Reading Time: 3 minutes
What if you could be proactive in your approach to cloud data security rather than reacting once an attack has been made? This is exactly the solution our guest is providing at Panther Labs. We speak with Jack Naglieri,...
by Pivot Point Security | Apr 22, 2022 | Application Security
Reading Time: 3 minutes
Web applications need to store tokens to help manage user sessions. Because the browser/server relationship is “stateless,” every request would otherwise require reauthentication. As a web developer, you typically have...
by Pivot Point Security | Mar 2, 2022 | InfoSec Strategies
Reading Time: 3 minutes
On a recent episode of The Virtual CISO Podcast, host John Verry channels his Nostradamus alter ego to predict the most important cybersecurity shifts and trends coming our way in 2022. “I don’t think it’s...
by Taylor Smith | Mar 2, 2022 | InfoSec Strategies
Reading Time: 6 minutes
From ransomware attacks spawning supply chain disruptions to ongoing fallout from the SolarWinds/SUNSPOT attack, 2021 was a banner year for cyber foul play across the board. As bad as the news about...
by Richard Barrus | Feb 1, 2022 | Application Security
Reading Time: 3 minutes
It seems like every week a new vulnerability surfaces that organizations need to be concerned about, evaluate and potentially address. How can you even keep up, let alone be...