22 Feb InfoSec Strategies | Category - Pivot Point Security Why Your Company Should Consider a Privacy Impact Assessment (PIA) January 15, 2024 By Richard Barrus Organizations that deal with personally identifiable information (PII) are increasingly aware of new privacy regulations like the EU’s ... Continue reading
21 Feb InfoSec Strategies | Category - Pivot Point Security vCISO vs. “Traditional” CISO – 3 Reasons a Virtual Chief InfoSec Officer Might be Better January 19, 2024 By Richard Barrus A vCISO (virtual chief information security officer) offers all the benefits of an in-house security leader but puts more resources... Continue reading
13 Feb InfoSec Strategies | Category - Pivot Point Security I Was Wrong about Risk Assessments—and You Probably Are as Well January 14, 2024 By John Verry Einstein once said, “The more I learn, the more I realize how much I don't know.” Unfortunately, I have come to that realization not ju... Continue reading
12 Feb InfoSec Strategies | Category - Pivot Point Security How to Securely Implement Cross-Origin Resource Sharing (CORS) July 15, 2024 By Richard Barrus In recent web application assessments, I’ve found a number of client applications that have cross-origin resource sharing (CORS) vulne... Continue reading
20 Nov InfoSec Strategies | Category - Pivot Point Security ISO 27017 vs. CSA STAR – The Two Leading Cloud Security Standards Compared January 19, 2024 By Richard Barrus With the exponential growth of cloud computing, organizations of all sizes need to understand their risks around storing sensitive data... Continue reading