21 Apr Cybersecurity | Category - Pivot Point Security, Third Party Risk Management The 2 Types of Organizations that Fail Information Security: Which One Are You? January 15, 2024 By Richard Barrus It’s axiomatic that many organizations “fail” information security, in the sense that they have significant unmitigated vulnerabilities... Continue reading
22 Jul InfoSec Strategies | Category - Pivot Point Security Why “Check-the-Box” Policies are a VERY Bad Idea January 15, 2024 By Richard Barrus It sometimes happens in the course of supporting clients during ISO 27001 certification projects or other information security assessme... Continue reading
22 May ISMS Consulting How Being in Information Security Has Changed My Annual OBGYN Visit by Carla Higginbotham January 14, 2024 By Carla Higginbotham Disclaimer: We are a transparent organization, and this is going to be very (very) transparent. All day, every day I speak to CIOs, CT... Continue reading
13 Feb InfoSec Strategies | Category - Pivot Point Security File Upload Vulnerabilities – How to Secure Your Upload Forms January 19, 2024 By Richard Barrus Enabling users to upload images, videos, documents and all manner of files is essential for many web applications, from social networki... Continue reading
01 Feb InfoSec Strategies | Category - Pivot Point Security Don’t Let Your IoT Devices Play “Hide-N-Seek” on the Most Sinister Botnet Yet January 18, 2024 By Taylor Smith Security researchers at the Romanian cybersecurity and antivirus software vendor Bitdefender have spotted what looks like the most soph... Continue reading