08 Jun InfoSec Strategies | Category - Pivot Point Security 4 Top Tools for Maximum CMMC Compliance Benefit with Minimum Effort June 20, 2024 By Richard Barrus Many SMBs in the US defense supply chain are rightly concerned about the high level of effort that is potentially required to achieve c... Continue reading
07 Jun InfoSec Strategies | Category - Pivot Point Security CMMC Compliant Access Control: How PreVeil Can Help You Get There January 12, 2024 By Richard Barrus The Cybersecurity Maturity Model Certification (CMMC) framework groups cybersecurity controls into 17 domains. Each domain defines vari... Continue reading
04 Jun InfoSec Strategies | Category - Pivot Point Security What is a Zero Trust Security Model and Why Should We (as a Business with Sensitive Data) Care? January 15, 2024 By Richard Barrus In recent weeks the global cyber community has been hit broadside by two devastating attacks—the SolarWinds hack and the Microsoft Exch... Continue reading
19 May InfoSec Strategies | Category - Pivot Point Security 300 Million and One Reasons to Fight Ransomware Across Your Supply Chain January 19, 2024 By John Verry In speaking with a client this week about the Colonial Pipeline Attack I referred back to the Maersk attack as they both illustrate the... Continue reading
11 May Cybersecurity | Category - Pivot Point Security, Third Party Risk Management MSPs – Here’s How to Choose Good Customers and Avoid the “Wildcards” January 14, 2024 By Richard Barrus It’s hard enough for outsourcers to choose the right Managed Service Provider (MSP). But how do MSPs go about finding the right custome... Continue reading