Monthly Archives: September 2018


Platform selected for its ability to deliver the most economical performance, resiliency and scalability that mission-critical environments require Austin, Texas, Sept. 25, 2018 — Pivot3, a leading provider of hybrid cloud and IoT security solutions, today announced that it is the recipient of a 2018 Global Security Exchange (GSX) Innovative Product […]

Pivot3 Honored with 2018 Innovative Product Award for Large-scale Surveillance ...


With the ever-evolving threat landscape, increased concern regarding cybersecurity, and the convergence of IT operations and security, many believe that cybersecurity programs must take an all-inclusive approach in addressing security incidents and data breaches. Traditional incident response models primarily offer technical guidance; they are not designed to help organizations gain […]

Going Beyond Incident Response




Deception is a breach detection tactic that utilizes decoys and misinformation to divert and delay an adversary.  As part of your overall cybersecurity strategy, this tactic gives the SOC / IR teams sufficient time to perform remediation before an adversary can complete their mission.  Deception is not generally used to […]

Decoys, Deception Sensors, and Breadcrumb Data – What’s a Hacker ...


Guest Contributor: Sterling Kellis, Assistant Dean of Technology, College of Information Systems and Technology, University of Phoenix American jazz musician Charles Mingus once said, “Making the simple complicated is commonplace, but making the complicated simple, awesomely simple, that’s creative genius.” Today, the security industry is in need of a stroke […]

Cybersecurity Upskilling and Lifelong Learning in the Digital Age


Employee mobility, BYOD, virtualization, and cloud services have all combined together to present organizations with a large and fluid environment for which they must identify and manage the vulnerabilities of every asset on the network.  A vulnerability scanner can help with this task by assessing computers, systems, and apps for […]

How do you manage vulnerabilities for your ever-changing IT attack ...