22 Jun InfoSec Strategies | Category - Pivot Point Security What is Managed Detection and Response (Really)? January 15, 2024 By Richard Barrus Today’s threat detection tool marketplace is a muddle of buzzwords, from endpoint detection and response (EDR) to network detection and... Continue reading
21 Jun InfoSec Strategies | Category - Pivot Point Security The Pros and Cons of Automated Threat Detection and Response January 15, 2024 By Richard Barrus A big tradeoff with today’s threat detection/response tools, like intrusion detection & response, endpoint detection & response... Continue reading
19 Jun InfoSec Strategies | Category - Pivot Point Security What is Endpoint Detection & Response (EDR) and How Does It Differ from Traditional Antivirus? January 15, 2024 By Richard Barrus Even among cybersecurity professionals there is substantial puzzlement and disagreement around today’s “next-gen antivirus” tools like ... Continue reading
09 Jun InfoSec Strategies | Category - Pivot Point Security Real-World Time and Effort to Implement PreVeil Encrypted Email and File Sharing January 14, 2024 By Richard Barrus If your business needs to comply with the Cybersecurity Maturity Model Certification (CMMC) framework, you may have heard about PreVeil... Continue reading
08 Jun InfoSec Strategies | Category - Pivot Point Security 4 Top Tools for Maximum CMMC Compliance Benefit with Minimum Effort June 20, 2024 By Richard Barrus Many SMBs in the US defense supply chain are rightly concerned about the high level of effort that is potentially required to achieve c... Continue reading