`

Articles

July 20, 2020
A Day in the life at MPG: Automation Engineer

What it’s like to be an Automation Engineer at MindPoint Group This month we’re interviewing Carnell Smith, one of MindPoint...

Read More
July 13, 2020
WebTA PrivEsc Vulnerability

Critical WebTA PrivEsc Vulnerability Discovery Details  This blog covers a recent security vulnerability found by a team of Pen Testers at MindPoint Group during a customer engagement....

Read More
July 13, 2020
WebTA SQLi Vulnerability

Critical WebTA SQLi Vulnerability Discovery Details This blog covers a recent security vulnerability found by a team of Pen Testers...

Read More
July 1, 2020
MindPoint Group Diversity and Inclusion Statistics

A look at our strive toward a diverse culture and how we plan to expand In this blog, Humaira, MPG’s...

Read More
June 24, 2020
TPRM 101- Your guide to creating a Third-Party Risk Management Program

What is a TPRM strategy and what is the ideal workflow for getting started?  Outsourcing or the use of third parties inherently comes with...

Read More
June 22, 2020
STIG vs. CIS part 2: Selecting the Best Baseline for Your Business

This blog is part 2 of our multi-post blog series on STIG vs. CIS. In this second post, we’re continuing to unpack the differences...

Read More
June 22, 2020
A Day in the life of a Business Development Manager at MindPoint Group

What is it Like to Work on the MindPoint Group Growth Team ? This month we’re interviewing Ben Strauss, a...

Read More
June 15, 2020
Incident Response Self-Assessment

Incidents Happen, How Prepared is Your Organization?  The nature of threats and Incident Response (IR) is an ever-changing landscape. In order to stay...

Read More
June 2, 2020
What’s the difference between Pen Testing, Red Teaming, and Threat Hunting?

At first glance, it seems like pen testing, red teaming, and threat hunting all seem like a fancy way of saying the...

Read More
April 28, 2020
How to Hack Through a Pass-Back Attack

A Pen Tester’s Guide to Printer Hacking What is an MFP anyway? Multi-Function Peripherals (MFPs) are an underutilized target in...

Read More
April 23, 2020
Compliance or Engineering: Cybersecurity’s Chicken & the Egg

Compliance-First or Engineering-First Approach? What came first, the chicken or the egg?  This common idiom befuddles many issues amongst philosophical...

Read More
April 21, 2020
Security Baseline and Compliance Automation Webinar

How to Overcome Compliance Barriers with Security Automation Overview: We’ll be honest with you, compliance is hard. Between shifting compliance...

Read More
12 3 4 ... Last