28 Oct Government | Category - Pivot Point Security 8 Trillion Reasons Why CMMC Matters to You (Even if You’re Not in the Defense Supply Chain) June 24, 2024 By John Verry Unless you have been living under the proverbial rock, you have heard about CMMC, the Cybersecurity Maturity Model Certification. This ... Continue reading
04 Oct ISMS Consulting What Threat Hunting and Pinot Noir Have in Common January 15, 2024 By John Verry Recently I discussed a potential vCISO engagement with a mid-size restaurant chain (500+ locations). They asked about our experience wi... Continue reading
10 Aug InfoSec Strategies | Category - Pivot Point Security 6 Strange-but-True Tales of IoT Hacks January 15, 2024 By Taylor Smith We tend to think of our world full of interconnected devices as fun and convenient. Why not monitor your toaster with a phone app—what ... Continue reading
23 Jul ISMS Consulting How Much vCISO Do I Need to Be Successful? January 15, 2024 By John Verry Over the last few years I have noticed that clients often struggle to understand how to obtain maximum value at the minimum possible co... Continue reading
13 Dec InfoSec Strategies | Category - Pivot Point Security Compliance vs. Security – Are You Secure AND Compliant, or Just Compliant? January 12, 2024 By Richard Barrus We see plenty of organizations that are compliant—but not secure. Yet rarely, if ever, do we find an organization to be secure but ... Continue reading