06 Feb Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, ISMS Consulting Understanding TISAX (Trusted Information Security Assessment Exchange) January 15, 2024 By Pivot Point Security Automotive OEMS, especially the largest German automakers and their top suppliers, created Trusted Information Security Assessment Exch... Continue reading
22 Apr Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security SEC Proposes New Rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure January 19, 2024 By Pivot Point Security On March 9, 2022, the US Securities and Exchange Commission (SEC) proposed sweeping new rules (available here) to standardize and impro... Continue reading
22 Apr Cloud Security | Category - Pivot Point Security Understanding the Cloud Controls Matrix December 5, 2024 By Pivot Point Security Leverage the leading cloud security attestation framework to achieve “provable security and compliance” for your SaaS environments As ... Continue reading
04 Apr InfoSec Strategies | Category - Pivot Point Security Fleet Device Management: Future Plans January 18, 2024 By Pivot Point Security Fleet Device Management is a leading open source device management solution built on the popular osquery open source project. The cross... Continue reading
01 Apr InfoSec Strategies | Category - Pivot Point Security Using Fleet’s Policy Feature for Configuration Management January 19, 2024 By Pivot Point Security Do you know what software is running on your endpoints? If not, you lack the ability to detect unauthorized applications or services, o... Continue reading