06 Jun ISMS Consulting What is a Microservice Architecture? December 28, 2023 By Pivot Point Security Microservice architectures are increasingly popular for building web applications. You’re probably familiar with traditional “monolithi... Continue reading
29 May ISMS Consulting How Poor Cyber Asset Management Enabled the Equifax Breach January 16, 2024 By Pivot Point Security On an April 2023 episode of The Virtual CISO Podcast, our guest Huxley Barbee, Security Evangelist at runZero, revealed how multiple sh... Continue reading
29 May ISMS Consulting 4 Ways a Strong Cyber Asset Management Program Can Help Block Ransomware Attacks June 20, 2024 By Pivot Point Security How can a strong cyber asset management program help prevent ransomware attacks from manifesting in your environment? Here are 4 ways: ... Continue reading
29 May ISMS Consulting Active Asset Scanning in OT Environments January 4, 2024 By Pivot Point Security Active scanning technology common to many vulnerability management tools is notorious for causing device crashes and other disruptions ... Continue reading
29 May ISMS Consulting Why Vulnerability Management Tools Fall Short for Cyber Asset Discovery January 15, 2024 By Pivot Point Security Many organizations use a vulnerability management tool for the asset discovery component of their cyber asset management process. Accor... Continue reading