10 Apr Information Security Industry Trends, InfoSec Strategies | Category - Pivot Point Security What is Hedera Hashgraph and How Does It Solve Blockchain Privacy Issues? December 5, 2024 By Pivot Point Security Distributed ledger technology (DLT) is a digital approach to recording transactions in a decentralized database without recourse to a t... Continue reading
06 Feb InfoSec Strategies | Category - Pivot Point Security CMMC Benefits December 5, 2024 By Pivot Point Security Maximize the Value of Your Security Investments The value preservation aspect of cybersecurity is obvious. Cybersecurity is the founda... Continue reading
15 Dec InfoSec Strategies | Category - Pivot Point Security Is Digital Business Risk Management the Future of Attack Surface Management? January 15, 2024 By Pivot Point Security Most attack surface management solutions can only operate within the space of assets you already know you have. But what about all that... Continue reading
10 Aug Cybersecurity | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security How to Measure the Value of Information Security January 16, 2024 By Pivot Point Security The value preservation aspect of cybersecurity is obvious. Cybersecurity is the foundation of protecting sensitive data, mitigating cyb... Continue reading
08 Aug InfoSec Strategies | Category - Pivot Point Security How Does the NIST Secure Software Development Framework (SSDF) Compare with OWASP SAMM, BSIMM, etc.? January 18, 2024 By Pivot Point Security The National Institute of Standards and Technology recently updated NIST SP 800-218, the Secure Software Development Framework (SSDF), ... Continue reading