23 Jun ISMS Consulting A FedRAMP ATO – The Good, The Bad, and the Ugly January 8, 2024 By Pivot Point Security Achieving a Federal Risk and Authorization Management Program Authority to Operate (FedRAMP ATO) is a critical goal for many cloud serv... Continue reading
06 Jun ISMS Consulting What is a Microservice Architecture and How Do I Secure It? January 15, 2024 By Pivot Point Security What is a Microservice Architecture and How Do I Secure It? Microservice architectures are now software mainstay. But the distributed,... Continue reading
06 Jun ISMS Consulting Security and Development Must Work Closely to Secure Microservices January 14, 2024 By Pivot Point Security Security and Development Must Work Closely to Secure Microservices What’s the magic formula for securing microservices? It starts with... Continue reading
06 Jun ISMS Consulting How Do Microservices Change Software Security? January 16, 2024 By Pivot Point Security How Do Microservices Change Software Security? How does leveraging a microservice architecture change the way you secure an applicatio... Continue reading
06 Jun ISMS Consulting Microservices and APIs—How Do They Connect? January 14, 2024 By Pivot Point Security Many organizations that are embracing a microservices approach to software development are decomposing their applications into componen... Continue reading