12 Aug InfoSec Strategies | Category - Pivot Point Security 80/20 Cyber Security, Part 2—The 3 Most Critical Controls June 24, 2024 By John Verry In part 1 of this post I introduced Vilfredo Pareto and “The Pareto Principle” as applied to information security. The goal is to mitig... Continue reading
11 May Penetration Testing Should Penetration Testing Be Part of Your SOC1 (or SOC2 or PCI) Scope? January 19, 2024 By John Verry Editor's Note: This post was originally published in September 2015 and has been updated for accuracy and comprehensiveness. For some ... Continue reading
16 Apr ISO 27001 Certification | Category - Pivot Point Security A Key “Hidden” Lesson from the Sony Breach: You’re Only as Strong as Your Soft Controls January 19, 2024 By John Verry Throughout 2014 and into 2015 with the recent Anthem Blue Cross breach, every few weeks with distressing regularity there has been a ne... Continue reading
21 Oct ISMS Consulting Are Your Calls Being Intercepted? More on Rogue Cell Phone Towers October 21, 2014 By John Verry Recently we blogged about rogue cell towers (also called IMSI catchers, stingrays or GSM interceptors) and the potential risk they pose... Continue reading
28 May ISMS Consulting Fun With SSH Reverse Shells May 28, 2010 By Richard Barrus Ever need to work on a remote computer which is behind a typical firewall. Well if there is no inbound connectivity, you can play a bit... Continue reading