22 Mar IoT Security | Category - Pivot Point Security A Hardware Hacker’s Top Tips for Building Secure IoT Devices June 27, 2024 By Pivot Point Security The Internet of Things (IoT) has basically become “all the things on the internet”—everything from sensors to smart door locks to biome... Continue reading
21 Mar IoT Security | Category - Pivot Point Security OK, So… What’s an IoT Device? January 19, 2024 By Pivot Point Security Experts estimate that humanity is on course to deploy up to 75 billion Internet of Things (IoT) devices by 2025. That’s about 10 device... Continue reading
08 Mar InfoSec Risk Assessment John Verry’s 2022 InfoSec Prediction #7: Software Security Goes Mainstream January 13, 2024 By Pivot Point Security What emerging trends will reshape the cybersecurity industry in 2022? John Verry, CISO and Managing Partner at Pivot Point Security, sh... Continue reading
03 Mar Ethical Hacking It’s Hard to Spell Security with API (Translation: You Need an AppSec Strategy) January 19, 2024 By John Verry The rapid growth of APIs has led to significant security risks. Unless you have been marooned on an uncharted coral atoll for the last ... Continue reading
17 Dec Application Security | Category - Pivot Point Security Web Application Attacks are Skyrocketing—Don’t Get Caught in the Crossfire January 15, 2024 By John Verry Recent research from Akami, Imperva and others show that web application attacks have increased by up to 300% since last year, resultin... Continue reading