24 Jun Cybersecurity | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security Managed Detection and Response (MDR): Which Firms are Using It? January 14, 2024 By Richard Barrus Despite ongoing warnings from experts and an escalating percentage of opportunistic attacks, SMBs continue to underestimate their cyber... Continue reading
23 Jun InfoSec Strategies | Category - Pivot Point Security Why It Now Takes 315 Days to Contain a Malicious Cyber Attack January 19, 2024 By Richard Barrus According to IBM Security’s 2020 Cost of a Data Breach Report, breaches caused by malicious attacks now take US organizations an averag... Continue reading
22 Jun InfoSec Strategies | Category - Pivot Point Security What is Managed Detection and Response (Really)? January 15, 2024 By Richard Barrus Today’s threat detection tool marketplace is a muddle of buzzwords, from endpoint detection and response (EDR) to network detection and... Continue reading
21 Jun InfoSec Strategies | Category - Pivot Point Security The Pros and Cons of Automated Threat Detection and Response January 15, 2024 By Richard Barrus A big tradeoff with today’s threat detection/response tools, like intrusion detection & response, endpoint detection & response... Continue reading
19 Jun InfoSec Strategies | Category - Pivot Point Security What is Endpoint Detection & Response (EDR) and How Does It Differ from Traditional Antivirus? January 15, 2024 By Richard Barrus Even among cybersecurity professionals there is substantial puzzlement and disagreement around today’s “next-gen antivirus” tools like ... Continue reading