26 Mar Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, IoT Security | Category - Pivot Point Security OWASP ISVS vs. CSA IoT Security Controls Framework – Which to Use When January 14, 2024 By Richard Barrus If you’re involved in information security, especially as a developer, you’ve likely come across the OWASP Foundation, a leading provid... Continue reading
25 Mar Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, IoT Security | Category - Pivot Point Security OWASP ISVS Levels Explained March 16, 2023 By Richard Barrus As a cybersecurity professional, you’ve probably heard of the nonprofit OWASP Foundation, a prominent authority on application security... Continue reading
24 Mar Cybersecurity | Category - Pivot Point Security, IoT Security | Category - Pivot Point Security The New OWASP IoT Security Verification Standard (ISVS) – What Does It Include? January 15, 2024 By Richard Barrus The OWASP Foundation is a globally respected source of guidance on web application security. Many cybersecurity practitioners will be f... Continue reading
19 Mar Cybersecurity | Category - Pivot Point Security, IoT Security | Category - Pivot Point Security The New OWASP ISVS – What, Why and Who? January 15, 2024 By Richard Barrus If you’re involved with cybersecurity, you’re probably aware of the OWASP Foundation, a leading authority globally on application secur... Continue reading
17 Mar Cybersecurity | Category - Pivot Point Security, IoT Security | Category - Pivot Point Security What is OWASP and Why Should You (as Someone Securing IoT) Care? January 15, 2024 By Richard Barrus If you’re charged with testing Internet of Things (IoT) devices or systems, we feel your pain. As the IoT explodes in diversity and com... Continue reading