HIPAA Compliance vs. Security…Why Not Both?
Happy Birthday, HIPAA! An Ode to the Intersection of Compliance and Security The recent celebration of HIPAA’s birthday inspired us...
Read MoreA Day in the Life: MPG Co-Founder and Partner
What it’s like to be an MPG co-founder and partner This month we’re interviewing Marc Dixon, one of MindPoint Group’s...
Read More3 Access Management Models and Why They’re Important
Your guide to the Bell-LaPadula, Biba, and Chinese Wall Access Management Models What is Access Management? Access Management is all about making...
Read MoreHow to configure and search within the Ansible Tower API using the Ansible URI Module
A Day in the life at MPG: Automation Engineer
What it’s like to be an Automation Engineer at MindPoint Group This month we’re interviewing Carnell Smith, one of MindPoint...
Read MoreWebTA PrivEsc Vulnerability
Critical WebTA PrivEsc Vulnerability Discovery Details This blog covers a recent security vulnerability found by a team of Pen Testers at MindPoint Group during a customer engagement....
Read MoreWebTA SQLi Vulnerability
Critical WebTA SQLi Vulnerability Discovery Details This blog covers a recent security vulnerability found by a team of Pen Testers...
Read MoreHPE 3PAR Security Vulnerability
MindPoint Group Diversity and Inclusion Statistics
A look at our strive toward a diverse culture and how we plan to expand In this blog, Humaira, MPG’s...
Read MoreTPRM 101- Your guide to creating a Third-Party Risk Management Program
What is a TPRM strategy and what is the ideal workflow for getting started? Outsourcing or the use of third parties inherently comes with...
Read MoreSTIG vs CIS part 2: Selecting the Best Baseline for Your Business
This blog is part 2 of our multi-post blog series on STIG vs CIS. In this second post, we’re continuing to unpack the differences...
Read MoreSTIG vs CIS part 1: The Anatomy of Baselines and Compliance
A Day in the life of a Business Development Manager at MindPoint Group
What is it Like to Work on the MindPoint Group Growth Team ? This month we’re interviewing Ben Strauss, a...
Read MoreIncident Response Self-Assessment
Incidents Happen, How Prepared is Your Organization? The nature of threats and Incident Response (IR) is an ever-changing landscape. In order to stay...
Read MoreWhat’s the difference between Pen Testing, Red Teaming, and Threat Hunting?
At first glance, it seems like pen testing, red teaming, and threat hunting all seem like a fancy way of saying the...
Read More