22 Aug Ethical Hacking What are the Financial Benefits of API-Level Security? January 19, 2024 By Pivot Point Security As development trends have shifted from traditional web applications with 3-tier (client-server-database) architectures to today’s API-... Continue reading
19 Aug Ethical Hacking How Does an API-First Architecture Affect Your App Attack Surface? January 18, 2024 By Pivot Point Security Back in the good old days (think back to, like, 2019) when web applications had a 3-tier client-server-database architecture, applicati... Continue reading
19 Aug Ethical Hacking Application Security and API Security are Becoming Synonymous—Are You Ready? January 18, 2024 By Pivot Point Security Concern about application security is finally catching up to the urgent need for it. Yet just as orgs are wrapping their AppSec program... Continue reading
18 Aug Ethical Hacking What You Need to Know about APIs and API Security January 19, 2024 By Pivot Point Security Application development is moving from a web-centric world to an API-centric world. If you’re wondering what that looks like, the secur... Continue reading
08 Aug InfoSec Strategies | Category - Pivot Point Security How Does the NIST Secure Software Development Framework (SSDF) Compare with OWASP SAMM, BSIMM, etc.? January 18, 2024 By Pivot Point Security The National Institute of Standards and Technology recently updated NIST SP 800-218, the Secure Software Development Framework (SSDF), ... Continue reading