03 Apr InfoSec Strategies | Category - Pivot Point Security File Inclusion Vulnerabilities and Defenses Against Them January 18, 2024 By Richard Barrus File inclusion vulnerabilities, including Remote File Inclusion (RFI) and Local File Inclusion (LFI) are most commonly found in web app... Continue reading
22 Mar InfoSec Strategies | Category - Pivot Point Security, Penetration Testing Application Security Best Practices in a Continuous Integration Model January 18, 2024 By Richard Barrus If your development teams have moved away from a waterfall approach to a more modern agile or DevOps methodology with frequent releases... Continue reading
13 Mar InfoSec Strategies | Category - Pivot Point Security Don’t Let Cryptojackers Strip-Mine Your Business and Users January 18, 2024 By Taylor Smith As malware changes over time in function, scope, and impact, researchers see different trends rise and fall as development of various k... Continue reading
20 Feb InfoSec Strategies | Category - Pivot Point Security 3 Reasons Your Business Needs an Information Security Risk Treatment Plan in 2018 January 18, 2024 By Richard Barrus ISO 27001 and other security frameworks generally mandate, in one form or another, a risk treatment plan. Let’s take a look at the thre... Continue reading
13 Feb InfoSec Strategies | Category - Pivot Point Security File Upload Vulnerabilities – How to Secure Your Upload Forms January 19, 2024 By Richard Barrus Enabling users to upload images, videos, documents and all manner of files is essential for many web applications, from social networki... Continue reading