27 Jan Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, IoT Security | Category - Pivot Point Security How I Got root on a Thermostat March 16, 2023 By Pivot Point Security When evaluating IoT device security from an attacker's perspective, the goal is to obtain the highest level of permissions on the devic... Continue reading
03 Jan Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security Cybersecurity Impacts of COVID-19: 2022 Update January 12, 2024 By Pivot Point Security COVID-19 responses like a remote work operating model with “vaporized” network perimeter, accelerated digital transformation and econom... Continue reading
30 Nov Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, Cybersecurity Maturity Model Certification (CMMC) Cyber Standards to Protect CUI are Coming for All US Government Suppliers January 12, 2024 By Richard Barrus As orgs in the US defense industrial base (DIB) come to terms with CMMC 2.0, thought leaders in the wider US government contracting sec... Continue reading
26 Nov Cloud Security | Category - Pivot Point Security, Compliance | Category - Pivot Point Security, Cybersecurity Maturity Model Certification (CMMC) CMMC 2.0 and NIST 800-171—Pressure from Primes Could Accelerate Compliance Timeframes January 18, 2024 By Richard Barrus Many organizations in the US defense industrial base (DIB) that handle Controlled Unclassified Information (CUI) have been working towa... Continue reading
22 Nov Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security Getting to a Trusted Information Security Ecosystem January 18, 2024 By Richard Barrus On the path to making information security a strategic business enabler, a big step is establishing a trusted InfoSec ecosystem. Wha... Continue reading