`

Articles

July 9, 2020
HPE 3PAR Security Vulnerability

Critical HPE 3PAR Vulnerability Discovery Details This blog covers a recent security vulnerability found by a team of Pen Testers...

Read More
July 1, 2020
MindPoint Group Diversity and Inclusion Statistics

A look at our strive toward a diverse culture and how we plan to expand In this blog, Humaira, MPG’s...

Read More
June 24, 2020
TPRM 101- Your guide to creating a Third-Party Risk Management Program

What is a TPRM strategy and what is the ideal workflow for getting started?  Outsourcing or the use of third parties inherently comes with...

Read More
June 22, 2020
STIG vs CIS part 1: The Anatomy of Baselines and Compliance

STIG vs CIS This blog is part 1 of our multi-post blog series on STIG vs CIS. In this series,...

Read More
June 22, 2020
A Day in the life of a Business Development Manager at MindPoint Group

What is it Like to Work on the MindPoint Group Growth Team ? This month we’re interviewing Ben Strauss, a...

Read More
June 15, 2020
Incident Response Self-Assessment

Incidents Happen, How Prepared is Your Organization?  The nature of threats and Incident Response (IR) is an ever-changing landscape. In order to stay...

Read More
May 7, 2020
A Day in the Life of a TPRM Analyst

What it’s like to be a Third-Party Risk Management (TPRM) Analyst This month we’re interviewing Kelley Grogan, a Third-Party Risk...

Read More
April 28, 2020
How to Hack Through a Pass-Back Attack: MFP Hacking Guide

A Pen Tester’s Guide to Printer Hacking What is an MFP and MFP Hacking anyway? Multi-Function Peripherals (MFPs) are an...

Read More
April 23, 2020
Compliance or Engineering: Cybersecurity’s Chicken & the Egg

Compliance-First or Engineering-First Approach? What came first, the chicken or the egg?  This common idiom befuddles many issues amongst philosophical...

Read More
April 14, 2020
Keys to A Successful Onsite Vendor Assessment for your TPRM program

How Onsite Assessments fit into your TPRM Strategy TPRM and Third-Party Vendor Assessments Third-Party Risk is a major concern for many organizations, especially...

Read More
April 3, 2020
A CISO’s Guide to Secure Remote Work

How to Ensure security while your Workforce is Remote Due to the recent COVID-19 outbreak, many people are now working from home for the first...

Read More
March 20, 2020
4 Ways to increase your security ROI with automation

How and why you should use automation to enforce security compliance  Enterprise IT is a vast network of highly varied, distributed...

Read More
1 2 34 5 6 ... Last