09 Dec Network Security Why the Latest Raspberry Pi CVE is (Almost) Completely Bogus March 16, 2023 By Mike Gargiullo Twitter and various InfoSec outlets just blew up over a CVE (Common Vulnerabilities and Exposures) database entry C...Continue reading
10 Sep Application Security “Transitioning to a Post-Password Future” with OWASP ASVS V4 March 16, 2023 By Richard Barrus The Application Security Verification Standard (ASVS) from the Open Web Application Security Project (OWASP) is now at Version 4. Besid...Continue reading
23 Apr InfoSec Strategies Password Security Tip #9: Make Passwords as Strong as They Need to Be April 23, 2019 By Richard Barrus What makes a password “strong”? And why is using only “strong” passwords so important? Both those questions can be answered in just two...Continue reading
18 Apr InfoSec Strategies Password Security Tip #10: Avoid Easily Guessable Passwords (Obvious but Crucial) April 18, 2019 By Richard Barrus We’re celebrating “Password Month” throughout April 2019 here on the Pivot Point Security blog. This is the first of 5 blogs counting d...Continue reading
16 Apr InfoSec Strategies Passwords Just Aren’t Enough Anymore: Why the Move to MFA is Inevitable April 16, 2019 By Terry Crowley There’s a new trend in cybercrime: why go to the trouble of hacking systems when you can exploit compromised login/password credentials...Continue reading