30 Mar InfoSec Strategies | Category - Pivot Point Security Open Source Device Management—Is It Right for Your Use Cases? January 14, 2024 By Pivot Point Security Open source software has long ago earned the respect of the developer community. But for business users it’s widely viewed as a bit lik... Continue reading
29 Mar InfoSec Strategies | Category - Pivot Point Security Open Source Device Management—It’s All About Transparency and Flexibility January 14, 2024 By Pivot Point Security Open source software has been an important part of the IT landscape since at least the 1990s. Released under a license that grants user... Continue reading
28 Mar InfoSec Strategies | Category - Pivot Point Security Is Open Source the Future of Endpoint Security January 18, 2024 By Pivot Point Security Open source provides transparency. Being able to see what code is running in your environment — as well as what’s being monitored on yo... Continue reading
23 Mar Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security “AWS for Security” — A One-Stop Shop in the Making? January 4, 2024 By Pivot Point Security If you haven’t heard the term “security infrastructure as a service,” read on because it has a disruptively bright future. Among the ve... Continue reading
22 Mar Cloud Security | Category - Pivot Point Security, Compliance | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security “AWS for Security” — Can It Also Support Compliance? January 18, 2024 By Pivot Point Security To be “provably secure,” you need to address compliance. With the emergence of LimaCharlie’s disruptive “security infrastructure as a s... Continue reading