26 Aug Application Security | Category - Pivot Point Security Applying the OWASP Software Assurance Maturity Model (SAMM) in Your Environment January 18, 2024 By Pivot Point Security As dev/test teams increasingly seek to build security into the software development lifecycle (SDLC), the OWASP Software Assurance Matu... Continue reading
25 Aug Application Security | Category - Pivot Point Security Breaking Down the Latest in Software Security Standards & the Impact on SaaS Businesses January 18, 2024 By Pivot Point Security What are the merits of the OWASP Software Assurance Maturity Model (SAMM), and how does it differ from OWASP’s Application Security Ver... Continue reading
25 Mar IoT Security | Category - Pivot Point Security IoT Device Security: What to Look for from Vendors January 15, 2024 By Pivot Point Security Sparked like new laws like California’s SB 327 mandating basic IoT device security, combined with growing security concerns in the mark... Continue reading
24 Mar IoT Security | Category - Pivot Point Security IoT Security Guidance: What is Its Real-World Value? January 16, 2024 By Pivot Point Security In response to widespread concern about the Internet of Things (IoT) security, various guidance and legal statutes have emerged. These ... Continue reading
23 Mar IoT Security | Category - Pivot Point Security Remotely Hacking IoT Devices: Here’s How It’s Done January 14, 2024 By Pivot Point Security Because of all the software that’s generally associated with connecting to the Internet of Things (IoT) devices, it’s often preferable ... Continue reading