1-888-PIVOT-POINT | 1-888-748-6876 info@pivotpointsecurity.com
Talk with an Expert »
Select Page
GDPR & Privacy Shield - What They Mean for Your Business

Sitemap

3 Reasons Why “Project Verify” Scares Me

A media buzz is building around an initiative by the “big 4” US mobile phone carriers (AT&T, Verizon, Sprint, T-Mobile) to replace mobile app passwords with a universal authentication service that leverages mobile phone data. Dubbed “Project Verify,”...

The Time Has Come to Move to Windows 10

It looks like Windows 10 has finally overtaken Windows 7 as the most widely-deployed Windows platform. From a cybersecurity standpoint, this is good news. Windows 10 is a more secure environment with more up-to-date security functionality built-in. Moreover, Windows...

What Does “Failure is Not an Option” Mean for Recovery Planning? 

The “failure is not an option” mindset and attitude are prominent in business circles.  The generic connotation of the phrase is that those responsible are absolutely committed to success come what may and will persevere until they find a way to prevail. But when I...

Credential Harvesting: It’s More Than Just Phishing and More Common Than Ever

According to the 2017 Verizon Data Breach Investigations Report, over 80% of hacking-related data breaches were the direct result of weak or stolen passwords. Hackers have long known that the easiest way to nab sensitive data is to obtain legitimate access...

What Threat Hunting and Pinot Noir Have in Common 

Recently I discussed a potential vCISO engagement with a mid-size restaurant chain (500+ locations). They asked about our experience with, and our thoughts on, “threat hunting.”  Threat hunting is loosely defined as “proactive incident response”—actively looking for...

Do New Regulations Mean that Data Security and Data Privacy Should Merge?

New data privacy regulations like GDPR and the California Consumer Protection Act of 2018 (CCPA) are forcing many organizations to factor privacy into their data security programs like never before. Do these new privacy mandates effectively merge the security and...

GDPR and the California Consumer Privacy Act of 2018 Compared 

With the EU’s GDPR now in force and California just enacting its Consumer Privacy Act (AB 375), the two-minute warning has sounded for US businesses that work with consumers’ personal data. You must move to implement privacy policies that align with these...

Why “Hacker” Gatherings Like DEF CON Matter for Your Business 

DEF CON 26, one of the world’s largest public gatherings of information security professionals and hobbyists, happened in Las Vegas on August 9-12. This event attracted over 20,000 attendees from around the globe for a weekend of panels, activities, labs, and even...

How the Fiserv Application Vulnerability Validates a Strength of OWASP ASVS

A recent security flaw in a financial technology application was discovered by a security researcher. The flaw illustrates a significant benefit of using the OWAS ASVS over the OWASP Top 10 list when verifying an application's information security. Here’s Why Not to...

Is “Business as Usual” the Biggest Business Continuity Trend?   

From my viewpoint, the latest statistics reported in the Business Continuity Trends and Challenges 2018 report from continuitycentral.com look pretty alarming. For example: The Disaster Recovery Preparedness Council found that nearly 75% of organizations worldwide...