by Pivot Point Security | Apr 22, 2022 | Application Security
Reading Time: 3 minutes
Web applications need to store tokens to help manage user sessions. Because the browser/server relationship is “stateless,” every request would otherwise require reauthentication. As a web developer, you typically have...
by Pivot Point Security | Mar 25, 2022 | IoT Security
Reading Time: 3 minutes
Sparked like new laws like California’s SB 327 mandating basic IoT device security, combined with growing security concerns in the market, more IoT device manufacturers are taking steps to improve...
by Pivot Point Security | Mar 24, 2022 | IoT Security
Reading Time: 3 minutes
In response to widespread concern about the Internet of Things (IoT) security, various guidance and legal statutes have emerged. These include comprehensive standards from trusted sources like OWASP, ENISA...
by Pivot Point Security | Mar 23, 2022 | IoT Security
Reading Time: 3 minutes
Because of all the software that’s generally associated with connecting to the Internet of Things (IoT) devices, it’s often preferable to compromise a device remotely to gain access to a wider attack...
by Pivot Point Security | Mar 22, 2022 | IoT Security
Reading Time: 4 minutes
The Internet of Things (IoT) has basically become “all the things on the internet”—everything from sensors to smart door locks to biomedical equipment to smartphones to you-name-it. Every one of these...