FedRAMP, FISMA, and SOC 2… What’s the Difference?
FedRAMP vs. FISMA vs. SOC 2: Similarities and Differences FISMA, FedRAMP, and SOC 2 are common IT Security terms, often bandied around interchangeably by...Read More
Is Compliance Scanning Still Relevant?
What is Compliance Scanning? Compliance scanning is the method used to ensure that system configuration is compliant with security policy controls. Unlike vulnerability scanning, which picks up...Read More
A Day in the life of a Business Development Manager at MindPoint Group
What is it Like to Work on the MindPoint Group Growth Team ? This month we’re interviewing Ben Strauss, a...Read More
4 Ways to increase your security ROI with automation
How to get started with DFARS and FISMA compliance
There’s an easier way to accelerate compliance If you’re reading this blog, you’re probably already aware of how difficult it...Read More
It’s past time we modernized security hardening procedures
Security baseline automation of STIG and CIS controls with Ansible With an ever-growing workload to accommodate, IT is deploying cloud...Read More
Even with automation, security baselines like STIG or CIS remain a challenge to manage. But there is hope for baseline automation.
Ever ask a sysadmin what they find most tedious about their job? If they’re being honest, keeping up with security...Read More