`

Articles

October 5, 2020
Phishing & Elections: 4 Ways to Protect Your Data During Election Season

Elections & Phishing: A Susceptible Population Some people associate elections with excitement and drama. Which candidate will win?  Which candidate...

Read More
October 2, 2020
How we Married Compliance Automation with Policy-as-Code: A GitLab Love Story

We recently had the join of partaking in GitLab Commit — a conference held by our friends at GitLab and...

Read More
October 1, 2020
Public Sector on Air: Cybersecurity, Compliance, & Automation with Red Hat

Public Sector on Air features Red Hatters, partners, and customers from public sector entities talking about common problems that need...

Read More
September 18, 2020
A Day in the life at MPG: System Administrator

This month we’re interviewing Simon Shtipelman, a System Administrator at MindPoint Group. In this blog, you’ll hear about his background...

Read More
September 15, 2020
How to Protect Your SIM Card from Hackers

What is SIM Card Hacking? Sim Card Hacking, also known as a SIM Swap Attack, SIM Port Hacking, or SIM...

Read More
September 2, 2020
How to Move Your SIEM to the Cloud

System information and event management (SIEM) solutions enable you to centralize threat management. You can use SIEMs to detect, analyze,...

Read More
August 20, 2020
A Day in the Life: MPG Co-Founder and Partner

What it’s like to be an MPG co-founder and partner This month we’re interviewing Marc Dixon, one of MindPoint Group’s...

Read More
August 14, 2020
3 Access Management Models and Why They’re Important

Your guide to the Bell-LaPadula, Biba, and Chinese Wall Access Management Models What is Access Management?  Access Management is all about making...

Read More
August 4, 2020
How to configure and search within the Ansible Tower API using the Ansible URI Module

Dynamically search within the Ansible Tower API Authors: Brennan Stride and George Nalen Ansible Tower API Project Background: During a...

Read More
July 13, 2020
WebTA PrivEsc Vulnerability

Critical WebTA PrivEsc Vulnerability Discovery Details  This blog covers a recent security vulnerability found by a team of Pen Testers at MindPoint Group during a customer engagement....

Read More
July 13, 2020
WebTA SQLi Vulnerability

Critical WebTA SQLi Vulnerability Discovery Details This blog covers a recent security vulnerability found by a team of Pen Testers...

Read More
July 9, 2020
HPE 3PAR Security Vulnerability

Critical HPE 3PAR Vulnerability Discovery Details This blog covers a recent security vulnerability found by a team of Pen Testers...

Read More
12 3 4 ... Last