22 Apr Application Security | Category - Pivot Point Security Local Storage Versus Cookies: Which to Use to Securely Store Session Tokens February 9, 2024 By Pivot Point Security Web applications need to store tokens to help manage user sessions. Because the browser/server relationship is “stateless,” every reque... Continue reading
02 Mar Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security John Verry’s 2022 InfoSec Predictions: Challenges & Responses January 19, 2024 By Pivot Point Security On a recent episode of The Virtual CISO Podcast, host John Verry channels his Nostradamus alter ego to predict the most important cyber... Continue reading
02 Mar Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security 2021 Cyber Incident Year in Review January 18, 2024 By Pivot Point Security From ransomware attacks spawning supply chain disruptions to ongoing fallout from the SolarWinds/SUNSPOT attack, 2021 was a banner year... Continue reading
01 Feb Application Security | Category - Pivot Point Security Can Attack Surface Management Help with Vulnerability Assessment? January 12, 2024 By Richard Barrus It seems like every week a new vulnerability surfaces that organizations need to be concerned about, evaluate and potentially address. ... Continue reading
13 Dec Application Security | Category - Pivot Point Security Severe Log4j 2 Vulnerability Puts Huge Swath of Enterprise and SaaS Apps at Grave Risk January 19, 2024 By Pivot Point Security The recent emergence of CVE-2021-44228, the so-called Log4Shell vulnerability, is a critical flaw affecting multiple versions of the ub... Continue reading