by Pivot Point Security | Apr 1, 2022 | Phishing
Reading Time: 4 minutes
Everybody has heard of malware and knows its most popular forms like ransomware, viruses, worms, spyware, bots, and rootkits. But for many of us malware is still “just a word.” Knowing a little more about...
by Pivot Point Security | Mar 3, 2022 | InfoSec Strategies
Reading Time: 3 minutes
On a recent episode of The Virtual CISO Podcast, host John Verry invokes his inner Nostradamus to forecast the most significant information security and privacy developments coming in 2022. “I don’t think...
by Taylor Smith | Mar 2, 2022 | InfoSec Strategies
Reading Time: 6 minutes
From ransomware attacks spawning supply chain disruptions to ongoing fallout from the SolarWinds/SUNSPOT attack, 2021 was a banner year for cyber foul play across the board. As bad as the news about...
by Richard Barrus | Feb 1, 2022 | Application Security
Reading Time: 3 minutes
It seems like every week a new vulnerability surfaces that organizations need to be concerned about, evaluate and potentially address. How can you even keep up, let alone be...
by Taylor Smith | Dec 13, 2021 | Application Security
Reading Time: 2 minutes
The recent emergence of CVE-2021-44228, the so-called Log4Shell vulnerability, is a critical flaw affecting multiple versions of the ubiquitous Apache Log4j 2 Java logging framework. Attackers are...