17 Jun Cybersecurity Maturity Model Certification (CMMC), InfoSec Strategies | Category - Pivot Point Security, ISO 27001 Certification | Category - Pivot Point Security Leveraging ISO 27001 for CMMC Requirements January 13, 2024 By John Verry Thomas Price from BSI is a crazy-accomplished auditor. He has experience in ISO 9001, 20000, 27001, 27017, NIST 800-171, NIST CSF. Th... Continue reading
02 Jun Application Security | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security You Need to Re-Think The OWASP Top 10 – Here’s Why January 15, 2024 By John Verry Andrew van der Stock is very serious about his espresso and has a darn fine beer palate. He also happens to be a Senior Application S... Continue reading
26 May InfoSec Strategies | Category - Pivot Point Security Why (and When) You Need Computer Forensics March 10, 2023 By John Verry The word forensics usually makes us think of homicide... but it applies to computers, too. Understanding the need for computer forensi... Continue reading
25 May InfoSec Strategies | Category - Pivot Point Security The Difference between Threat Data and Threat Intelligence—and Why It Matters January 19, 2024 By Richard Barrus There’s a lot of buzz about threat intelligence and threat hunting these days. But beyond the hype, what intelligence are organizatio... Continue reading
22 May InfoSec Strategies | Category - Pivot Point Security Why Your SIEM Tool Needs to Monitor Cloud Environments… or Else January 15, 2024 By Richard Barrus To share key considerations and best practices for SIEM adoption, a recent episode of The Virtual CISO Podcast from Pivot Point Secur... Continue reading