22 Mar InfoSec Strategies | Category - Pivot Point Security, Penetration Testing Application Security Best Practices in a Continuous Integration Model January 18, 2024 By Richard Barrus If your development teams have moved away from a waterfall approach to a more modern agile or DevOps methodology with frequent releases... Continue reading
11 Aug ISMS Consulting How Severe a Vulnerability is that End-Of-Life Software? January 18, 2024 By Richard Barrus It’s commonplace for the vulnerability scans I run at client sites to turn up servers running unsupported software like Windows Server ... Continue reading