`

Articles

April 28, 2020
How to Hack Through a Pass-Back Attack: MFP Hacking Guide

A Pen Tester’s Guide to Printer Hacking What is an MFP and MFP Hacking anyway? Multi-Function Peripherals (MFPs) are an...

Read More
April 23, 2020
Compliance or Engineering: Cybersecurity’s Chicken & the Egg

Compliance-First or Engineering-First Approach? What came first, the chicken or the egg?  This common idiom befuddles many issues amongst philosophical...

Read More
April 21, 2020
Security Baseline and Compliance Automation Webinar

How to Overcome Compliance Barriers with Security Automation Webinar Overview: We’ll be honest with you, compliance is hard. Between shifting...

Read More
April 3, 2020
A CISO’s Guide to Secure Remote Work

How to Ensure security while your Workforce is Remote Due to the recent COVID-19 outbreak, many people are now working from home for the first...

Read More
March 20, 2020
4 Ways to increase your security ROI with automation

How and why you should use automation to enforce security compliance  Enterprise IT is a vast network of highly varied, distributed...

Read More
March 20, 2020
A Day in the Life of a Cybersecurity Recruiter at MindPoint Group

A Day in the Life of a Cybersecurity Recruiter This month we talked with Mindy Vo, one of our Cybersecurity...

Read More
March 4, 2020
A Day in the Life of a SOC Analyst: Part 3

This month we’re touching base with Dustin Higgins, one of MindPoint Group’s Security Operations Center (SOC) Analysts. This blog is the last...

Read More
March 2, 2020
6 Ways to Get Started with Your Fourth-Party Vendor Program

6 Ways to Get Started with Your Fourth-Party Vendor Program What is Fourth-Party Vendor Risk Management?  According to expert studies, more than...

Read More
February 28, 2020
How the CMMC Shows a Greater Focus on Third-Party Risk Management

CMMC & Third-Party Risk Management  Comply or Say Goodbye  If you’re not familiar with the Cybersecurity Maturity Model Certification (CMMC), you’re not alone—but for those...

Read More
February 14, 2020
3 Ways to Prepare for CMMC

3 Ways to Prepare for CMMC The Cybersecurity Maturity Model Certification (CMMC) is a recent mandate from the Department of Defense (DoD) for all vendors to...

Read More
February 5, 2020
3 Vulnerabilities to be on the Lookout for in 2020

3 Vulnerabilities to be on the Lookout for in 2020 1.Security Misconfigurations What is a security misconfiguration? A security misconfiguration...

Read More
January 30, 2020
A Day in the Life of a SOC Analyst: Part 2

This month we’re touching base with Christopher Generazio, one of MindPoint Group’s Security Operations Center (SOC) Analysts. This blog is the second...

Read More
1 2 34 5 6 ... Last