26 May InfoSec Strategies | Category - Pivot Point Security Why (and When) You Need Computer Forensics March 10, 2023 By John Verry The word forensics usually makes us think of homicide... but it applies to computers, too. Understanding the need for computer forensi... Continue reading
25 May InfoSec Strategies | Category - Pivot Point Security The Difference between Threat Data and Threat Intelligence—and Why It Matters January 19, 2024 By Richard Barrus There’s a lot of buzz about threat intelligence and threat hunting these days. But beyond the hype, what intelligence are organizatio... Continue reading
22 May InfoSec Strategies | Category - Pivot Point Security Why Your SIEM Tool Needs to Monitor Cloud Environments… or Else January 15, 2024 By Richard Barrus To share key considerations and best practices for SIEM adoption, a recent episode of The Virtual CISO Podcast from Pivot Point Secur... Continue reading
21 May InfoSec Strategies | Category - Pivot Point Security The #1 Most Important Feature of a Security Information Management Solution for SMBs January 19, 2024 By Richard Barrus The goal of Security Information Event Management (SIEM) is to reduce risk to sensitive data behind the firewall and minimize breach ... Continue reading
20 May InfoSec Strategies | Category - Pivot Point Security SIEM, a SOC, an MSSP… Choosing Correctly is Crucial for every SMB January 14, 2024 By Richard Barrus The coronavirus scenario is fueling an already hot trend in Security Information & Event Management (SIEM) tool deployment among SM... Continue reading