`

Articles

September 20, 2018
Insider Threat Mitigation – Just Players in a Risk Management Game

Let’s meet some actors in this game, shall we?  First, we have Roger, who is angry that his peers have...

Read More
September 6, 2018
Social Engineering Part 3: Phishing

If you survey your co-workers, chances are high you will find they have received a phishing email at some point....

Read More
August 26, 2018
MindPoint Group Achieving Diversity Without Mandate…What’s in the Secret Sauce?

Frequently stated, not often enough repeated, “Diversity is an action, inclusivity is a culture, and belonging is a feeling” (Forbes,...

Read More
July 18, 2018
A Tale Of Two Tools: When Splunk met SecurityCenter

Co-Authors:  Keith Rhea and Alex Nanthavong It was the best of times, it was the worst of times, it was...

Read More
July 5, 2018
Hardware Vulnerability: Understanding Spectre, Meltdown and the Price of Unchecked Modernization

Firewalls, encryption, antivirus software, armed security guards, dual authentication and every other added security mechanism that exists to secure data,...

Read More
June 26, 2018
Guide to Creating a Cybersecurity Challenge for Kids

By:  Stephanie Carruthers and Nolan Kennedy “Right now, we’ve got about 300,000 unfilled cybersecurity positions as a nation,” said Rick...

Read More
May 9, 2018
Conducting and Detecting Data Exfiltration

How to Conduct and Detect Data Exfiltration Is your organization taking proactive measures to prevent a data breach?  From 2016...

Read More
April 3, 2018
CloudFront Hijacking

I recently spent some time exploring the issue of CloudFront domain hijacking. This is not a new issue but I...

Read More
September 6, 2017
Improving Provisioning in VMware with Ansible

This coming Thursday, September 7th, MindPoint Group VP for Information Security and Privacy Matt Shepherd will be presenting “Where to...

Read More
December 15, 2016
A+: AMI’s, Automation & AWS

A few weeks ago, I attended AWS re:Invent 2016 with nine of my colleagues. If you have never been, re:Invent is...

Read More
November 27, 2016
The AWS Shared Security Model – Part II: A Step Towards FedRAMP Compliance

If you have a cloud service offering that you are trying to market to the Federal Government, chances are you’ve...

Read More
November 24, 2016
Stop By Booth 118 @ AWS re:Invent and Speak to Our Team of Cybersecurity Experts

Read More