01 Feb InfoSec Strategies | Category - Pivot Point Security Don’t Let Your IoT Devices Play “Hide-N-Seek” on the Most Sinister Botnet Yet January 18, 2024 By Taylor Smith Security researchers at the Romanian cybersecurity and antivirus software vendor Bitdefender have spotted what looks like the most soph... Continue reading
13 Sep InfoSec Strategies | Category - Pivot Point Security Today’s 8 Hottest Security Threats—and How to Counter Them January 19, 2024 By Richard Barrus The recent HBO breach is now known to be much, much worse than the Sony content hack of 2014 or the more recent, financially motivated ... Continue reading
07 Jun ISMS Consulting Cyber Threat Landscape 2017 – Why You Need a Robust ISMS January 12, 2024 By Richard Barrus Politics and cyber threats are inextricably linked in 2017's cyber threat landscape. Political drama can serve both as justification fo... Continue reading
28 Feb InfoSec Risk Assessment The Danger of Over-Hyping Cyber Threats February 28, 2017 By Richard Barrus This post has been brewing for some time. I decided for sure to write it after digesting the press fallout from the most recent series ... Continue reading
18 Oct Ethical Hacking, Penetration Testing The Internet of Things: Basic Security Implications You Definitely Need To Be Aware Of January 18, 2024 By Richard Barrus Define: Internet of Things (IoT) The internet of things (IoT) is the internetworking of physical devices, vehicles, buildings, and oth... Continue reading