MPG Blog

August 15, 2018
Social Engineering Part 2: Open-Source Intelligence (OSINT)

“Most scams work because victims are successfully convinced the scam is real. Thus, victims give criminals their information more often...

Read More
June 26, 2018
Guide to Creating a Cybersecurity Challenge for Kids

By:  Stephanie Carruthers and Nolan Kennedy “Right now, we’ve got about 300,000 unfilled cybersecurity positions as a nation,” said Rick...

Read More
May 9, 2018
Conducting and Detecting Data Exfiltration

How to Conduct and Detect Data Exfiltration Is your organization taking proactive measures to prevent a data breach?  From 2016...

Read More
October 8, 2016
A Holistic Approach to Insider Threat

Differentiating malicious insiders from normal users has proven to be one of the most difficult security challenges facing the Federal...

Read More