25 Aug Application Security | Category - Pivot Point Security Breaking Down the Latest in Software Security Standards & the Impact on SaaS Businesses January 18, 2024 By Pivot Point Security What are the merits of the OWASP Software Assurance Maturity Model (SAMM), and how does it differ from OWASP’s Application Security Ver... Continue reading
22 Apr Application Security | Category - Pivot Point Security Local Storage Versus Cookies: Which to Use to Securely Store Session Tokens February 9, 2024 By Pivot Point Security Web applications need to store tokens to help manage user sessions. Because the browser/server relationship is “stateless,” every reque... Continue reading
25 Mar IoT Security | Category - Pivot Point Security IoT Device Security: What to Look for from Vendors January 15, 2024 By Pivot Point Security Sparked like new laws like California’s SB 327 mandating basic IoT device security, combined with growing security concerns in the mark... Continue reading
24 Mar IoT Security | Category - Pivot Point Security IoT Security Guidance: What is Its Real-World Value? January 16, 2024 By Pivot Point Security In response to widespread concern about the Internet of Things (IoT) security, various guidance and legal statutes have emerged. These ... Continue reading
23 Mar IoT Security | Category - Pivot Point Security Remotely Hacking IoT Devices: Here’s How It’s Done January 14, 2024 By Pivot Point Security Because of all the software that’s generally associated with connecting to the Internet of Things (IoT) devices, it’s often preferable ... Continue reading