13 Aug Phishing | Category - Pivot Point Security What is Content Disarm and Reconstruction and Why Should I (as a Recipient of Digital Documents) Care? August 13, 2024 By Pivot Point Security Cybersecurity resembles an endless game of cops and robbers. As new digital technologies emerge, both legitimate organizations and cybe... Continue reading
06 Aug Phishing | Category - Pivot Point Security Why File-Based Malware Dominates Cyberattacks August 6, 2024 By Pivot Point Security Files and documents are indispensable to computing and to running an organization. No wonder injecting malicious code into files is als... Continue reading
01 Apr Phishing | Category - Pivot Point Security How Malware Spreads January 16, 2024 By Pivot Point Security Everybody has heard of malware and knows its most popular forms like ransomware, viruses, worms, spyware, bots, and rootkits. But for m... Continue reading
02 Mar Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security 2021 Cyber Incident Year in Review January 18, 2024 By Pivot Point Security From ransomware attacks spawning supply chain disruptions to ongoing fallout from the SolarWinds/SUNSPOT attack, 2021 was a banner year... Continue reading
10 Jan IoT Security | Category - Pivot Point Security Attack Surface Management with RiskIQ’s PassiveTotal Platform January 4, 2024 By Richard Barrus Every organization has an attack surface, consisting of all the hardware, software, SaaS resource and cloud-based assets that connect t... Continue reading