22 Dec Cybersecurity | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security ‘Twas the Night after Christmas, and the Hackers were Stirring… January 19, 2024 By Pivot Point Security The story that follows, told by our partner wekos, an MSP focused on IT resiliency, is perfect for the season, as it is a Christmas sto... Continue reading
25 Aug InfoSec Strategies | Category - Pivot Point Security Using Python and Machine Learning to Predict Cyber Attacks: A Summer Intern’s Story January 15, 2024 By Johnna Verry For summer 2021 I was excited to once again intern with Pivot Point Security. I enjoyed working there last summer and learned a lot ab... Continue reading
25 May InfoSec Strategies | Category - Pivot Point Security The Difference between Threat Data and Threat Intelligence—and Why It Matters January 19, 2024 By Richard Barrus There’s a lot of buzz about threat intelligence and threat hunting these days. But beyond the hype, what intelligence are organizatio... Continue reading
22 May InfoSec Strategies | Category - Pivot Point Security Why Your SIEM Tool Needs to Monitor Cloud Environments… or Else January 15, 2024 By Richard Barrus To share key considerations and best practices for SIEM adoption, a recent episode of The Virtual CISO Podcast from Pivot Point Secur... Continue reading
21 May InfoSec Strategies | Category - Pivot Point Security The #1 Most Important Feature of a Security Information Management Solution for SMBs January 19, 2024 By Richard Barrus The goal of Security Information Event Management (SIEM) is to reduce risk to sensitive data behind the firewall and minimize breach ... Continue reading