13 Nov Penetration Testing When It Comes to Patching Vulnerabilities, “Missing Some Spots” Isn’t Good Enough January 19, 2024 By Terry Crowley One of the challenges of my job is about once every five weeks or so our marketing director shakes me down for a blog topic. If I don’t... Continue reading
20 Aug Security Awareness Training | Category - Pivot Point Security 80/20 Cyber Security, Part 3—The 3 Essential Technical Controls January 4, 2024 By John Verry In part 1 of this post I applied “the 80/20 rule” to cyber security. The goal is to mitigate about 80% of your InfoSec risk with 20% of... Continue reading
27 Nov ISMS Consulting How Long Does It Take You to Patch a Critical Vulnerability? January 18, 2024 By Terry Crowley A recent report from tCell that analyzed more than 316 million security incidents shares key data on the most common real-world attacks... Continue reading
17 Jul Third Party Risk Management A Guide to Managing Technical Vulnerabilities for Municipalities January 19, 2024 By Richard Barrus For the last 20 months or so, we’ve worked with nearly 200 government municipalities on cyber loss control projects, now largely comple... Continue reading
25 Apr InfoSec Strategies | Category - Pivot Point Security Why Cryptocurrency Mining Malware is Targeting Corporate Networks—and Why You Should Care January 12, 2024 By Mike Gargiullo A number of threat researchers are now reporting a massive and sustained spike of almost 500% in the volume of illicit cryptocurrency m... Continue reading