Is Compliance Scanning Still Relevant? What is Compliance Scanning? Compliance scanning is the method used to ensure that system configuration is compliant with security policy controls. Unlike vulnerability scanning, which picks up... Read More
4 Things to Know About the NIST Phish Scale 4 Things to Know About the NIST Phish Scale When you think of a security risk or vulnerability, what’s the... Read More
WebTA SQLi Vulnerability Critical WebTA SQLi Vulnerability Discovery Details This blog covers a recent security vulnerability found by a team of Pen Testers... Read More
A Day in the Life of a SOC Analyst: Part 3 This month we’re touching base with Dustin Higgins, one of MindPoint Group’s Security Operations Center (SOC) Analysts. This blog is the last... Read More
Is Compliance Scanning Still Relevant? What is Compliance Scanning? Compliance scanning is the method used to ensure that system configuration is compliant with security policy controls. Unlike vulnerability scanning, which picks up... Read More
4 Things to Know About the NIST Phish Scale 4 Things to Know About the NIST Phish Scale When you think of a security risk or vulnerability, what’s the... Read More
WebTA SQLi Vulnerability Critical WebTA SQLi Vulnerability Discovery Details This blog covers a recent security vulnerability found by a team of Pen Testers... Read More
A Day in the Life of a SOC Analyst: Part 3 This month we’re touching base with Dustin Higgins, one of MindPoint Group’s Security Operations Center (SOC) Analysts. This blog is the last... Read More