03 Mar Ethical Hacking It’s Hard to Spell Security with API (Translation: You Need an AppSec Strategy) January 19, 2024 By John Verry The rapid growth of APIs has led to significant security risks. Unless you have been marooned on an uncharted coral atoll for the last ... Continue reading
09 Aug Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security IoT Devices: The Lord Giveth and He Taketh Away January 16, 2024 By John Verry News flash for those who have been asleep for the last few years—there are a lot of security issues in IoT. When an issue rises to t... Continue reading
27 Mar Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, IoT Security | Category - Pivot Point Security What is an IoT Ecosystem and How Do You Test One? January 15, 2024 By Richard Barrus Anybody who is involved with securing or validating Internet of Things (IoT) solutions knows that they often involve a web of conne... Continue reading
26 Mar Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, IoT Security | Category - Pivot Point Security OWASP ISVS vs. CSA IoT Security Controls Framework – Which to Use When January 14, 2024 By Richard Barrus If you’re involved in information security, especially as a developer, you’ve likely come across the OWASP Foundation, a leading provid... Continue reading
25 Mar Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, IoT Security | Category - Pivot Point Security OWASP ISVS Levels Explained March 16, 2023 By Richard Barrus As a cybersecurity professional, you’ve probably heard of the nonprofit OWASP Foundation, a prominent authority on application security... Continue reading