30 Mar InfoSec Strategies | Category - Pivot Point Security Open Source Device Management—Is It Right for Your Use Cases? January 14, 2024 By Pivot Point Security Open source software has long ago earned the respect of the developer community. But for business users it’s widely viewed as a bit lik... Continue reading
29 Mar InfoSec Strategies | Category - Pivot Point Security Open Source Device Management—It’s All About Transparency and Flexibility January 14, 2024 By Pivot Point Security Open source software has been an important part of the IT landscape since at least the 1990s. Released under a license that grants user... Continue reading
28 Mar InfoSec Strategies | Category - Pivot Point Security Is Open Source the Future of Endpoint Security January 18, 2024 By Pivot Point Security Open source provides transparency. Being able to see what code is running in your environment — as well as what’s being monitored on yo... Continue reading
21 Aug Security Awareness Training | Category - Pivot Point Security 80/20 Cyber Security, Part 4—The 3 “Damage Control” Controls June 24, 2024 By John Verry If you’ve been following along with this multi-part post, you’ve seen how to mitigate about 80% of your InfoSec risk with 20% of the ef... Continue reading
28 Mar Business Continuity Management Why Your Business Continuity Plan Must Cover Cyber Incident Response January 18, 2024 By Richard Barrus One of the top benefits of a Business Continuity Plan is that it helps the business react more quickly and effectively to disruptive ev... Continue reading