25 Aug Application Security Breaking Down the Latest in Software Security Standards & the Impact on SaaS Businesses September 27, 2022 By Pivot Point Security What are the merits of the OWASP Software Assurance Maturity Model (SAMM), and how does it differ from OWASP’s Application Security Ver...Continue reading
22 Apr Application Security Local Storage Versus Cookies: Which to Use to Securely Store Session Tokens March 16, 2023 By Pivot Point Security Web applications need to store tokens to help manage user sessions. Because the browser/server relationship is “stateless,” every reque...Continue reading
25 Mar IoT Security IoT Device Security: What to Look for from Vendors March 16, 2023 By Pivot Point Security Sparked like new laws like California’s SB 327 mandating basic IoT device security, combined with growing security concerns in the mark...Continue reading
24 Mar IoT Security IoT Security Guidance: What is Its Real-World Value? March 16, 2023 By Pivot Point Security In response to widespread concern about the Internet of Things (IoT) security, various guidance and legal statutes have emerged. These ...Continue reading
23 Mar IoT Security Remotely Hacking IoT Devices: Here’s How It’s Done March 16, 2023 By Pivot Point Security Because of all the software that’s generally associated with connecting to the Internet of Things (IoT) devices, it’s often preferable ...Continue reading