07 Jun InfoSec Strategies | Category - Pivot Point Security CMMC Compliant Access Control: How PreVeil Can Help You Get There January 12, 2024 By Richard Barrus The Cybersecurity Maturity Model Certification (CMMC) framework groups cybersecurity controls into 17 domains. Each domain defines vari... Continue reading
04 Jun InfoSec Strategies | Category - Pivot Point Security What is a Zero Trust Security Model and Why Should We (as a Business with Sensitive Data) Care? January 15, 2024 By Richard Barrus In recent weeks the global cyber community has been hit broadside by two devastating attacks—the SolarWinds hack and the Microsoft Exch... Continue reading
19 May InfoSec Strategies | Category - Pivot Point Security 300Â Million and One Reasons to Fight Ransomware Across Your Supply Chain January 19, 2024 By John Verry In speaking with a client this week about the Colonial Pipeline Attack I referred back to the Maersk attack as they both illustrate the... Continue reading
17 May InfoSec Strategies | Category - Pivot Point Security Do We Need a Virtual CISO? March 16, 2023 By John Verry To a harried CTO who is tasked with dealing with security issues at the expense of his cloud migration efforts, a vCISO to make some of... Continue reading
14 May Cloud Security | Category - Pivot Point Security, Compliance | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security Need to Sway Your CFO on a Big Project? Leave Jargon at the Door. January 14, 2024 By Richard Barrus With the rise of compliance mandates like the Cybersecurity Maturity Model Certification (CMMC) or the California Privacy Rights Act (C... Continue reading