`

Articles

December 28, 2018
2018 YEAR IN REVIEW: Our Cybersecurity Awards & Recognition

  Want to learn about our services?  Click this link

Read More
December 27, 2018
2018 YEAR IN REVIEW: Diversity Leader in Cybersecurity

Diversity Leader in Cybersecurity At MindPoint Group, the core of who we are is diversity, acceptance and a celebration of...

Read More
December 26, 2018
2018 YEAR IN REVIEW: Giving Back To Our Community

MindPoint Group is proud to support organizations working to strengthen our communities through our Volunteer Initiative Program (VIP). Through the...

Read More
November 18, 2018
REST Assured: Penetration Testing REST APIs Using Burp Suite: Part 2 – Testing

Welcome back! In part 1 of REST Assured blog series, we discussed the definitions and history behind APIs, and we...

Read More
November 14, 2018
REST Assured: Penetration Testing REST APIs Using Burp Suite: Part 1 – Introduction & Configuration

Pen Testing REST API with Burp Suite Introduction:   Hello and welcome to our 3-part blog series where we will...

Read More
September 28, 2018
Unconventional Automation: Ansible for FedRAMP

Ansible today is more powerful than it has ever been. Over the past few years it has taken the IT automation...

Read More
September 20, 2018
Insider Threat Mitigation – Just Players in a Risk Management Game

Let’s meet some actors in this game, shall we?  First, we have Roger, who is angry that his peers have...

Read More
September 6, 2018
Social Engineering Part 3: Phishing

If you survey your co-workers, chances are high you will find they have received a phishing email at some point....

Read More
August 26, 2018
MindPoint Group Achieving Diversity Without Mandate…What’s in the Secret Sauce?

Frequently stated, not often enough repeated, “Diversity is an action, inclusivity is a culture, and belonging is a feeling” (Forbes,...

Read More
July 18, 2018
A Tale Of Two Tools: When Splunk met SecurityCenter

Co-Authors:  Keith Rhea and Alex Nanthavong It was the best of times, it was the worst of times, it was...

Read More
July 5, 2018
Hardware Vulnerability: Understanding Spectre, Meltdown and the Price of Unchecked Modernization

Firewalls, encryption, antivirus software, armed security guards, dual authentication and every other added security mechanism that exists to secure data,...

Read More
June 26, 2018
Guide to Creating a Cybersecurity Challenge for Kids

By:  Stephanie Carruthers and Nolan Kennedy “Right now, we’ve got about 300,000 unfilled cybersecurity positions as a nation,” said Rick...

Read More
1 2 34 5 6 ... Last