Solutions
By Industry
Cloud Services
Financial Services
Government
Healthcare
By Role
CIO and CISO
DevSecOps
IT Operations
Security
By Need
Cybersecurity Transformation
Cybersecurity Hygiene
Data Security and Privacy
FedRAMP
Governance, Risk, and Compliance
ICAM
Incident Response
Penetration Testing
Security Automation
Managed SOC
Vulnerability Management
Services
Assess
Assessments
Cyber Hygiene Health Check
CMMC and C3PAO
Framework and Policy
FedRAMP and 3PAO
Third-Party Risk Management
Protect
Cyber Hunting
Red Teaming
Penetration Testing
Phishing and Social Engineering
Vulnerability Management
Zero Trust
Respond
Incident Response
Managed SOC
Transform
GRC Advisory
Security Architecture
SOC Optimization
Automate
ATO Automation
Baseline Modernization
Security Optimization
Products
Ansible Counselor
Accelerate your automation journey
Lockdown Enterprise
STIG and CIS compliance automation using Ansible
Policy and Procedure Templates for FedRAMP
Guided support to help you achieve FedRAMP authorization
Resources
Blog
Automation
Penetration Testing
Risk Management
Vulnerability Management
FedRAMP
News
Datasheets and Whitepapers
Downloadables about our Solutions, Products, and Solutions
Company
Why MPG
Careers
Customers
Team
Partnering
Contract Vehicles
Community
Contact Us
Capability Statement
We're Hiring
Assess
View All
Company
Events
Automate
Transform
Assess
Protect
Respond
CMMC 2.0: The Next Generation
Assess
by
Noelie Vias
CMMC 2.0: The Next Generation
Assess
by
Noelie Vias
CMMC: Where it all started
Assess
by
Noelie Vias
CMMC: Where it all started
Assess
by
Noelie Vias
Preparing for a CMMC Assessment
Assess
by
Septima Luke
Preparing for a CMMC Assessment
Assess
by
Septima Luke
3 Ways to Prepare for CMMC
Assess
by
Michael Buzard
3 Ways to Prepare for CMMC
Assess
by
Michael Buzard
Your Data's Your Data: Managing Third Party Risk
Assess
by
Ben Strauss
Your Data's Your Data: Managing Third Party Risk
Assess
by
Ben Strauss
Insider Threats Aren’t Always What you Expect
Assess
by
Samantha Dizor Carter
Insider Threats Aren’t Always What you Expect
Assess
by
Samantha Dizor Carter
HIPAA Compliance vs. Security…Why Not Both?
Assess
by
Nicholas Vaccariello
HIPAA Compliance vs. Security…Why Not Both?
Assess
by
Nicholas Vaccariello
Choosing a 3PAO: FedRAMP, Cybersecurity & Cloud Expertise are Vital
Assess
by
Matthew Biester
Choosing a 3PAO: FedRAMP, Cybersecurity & Cloud Expertise are Vital
Assess
by
Matthew Biester
CMMC Level 1 Practice Areas and Controls
Assess
by
Michael Buzard
CMMC Level 1 Practice Areas and Controls
Assess
by
Michael Buzard
A Quick Guide to NIST 800-53, NIST 800-171, CMMC, and FedRAMP
Assess
by
Ben Strauss
A Quick Guide to NIST 800-53, NIST 800-171, CMMC, and FedRAMP
Assess
by
Ben Strauss
Ascension Facing Consequences from the FTC After Failing to Follow Safeguards Rule
Assess
by
Usman Khan
Ascension Facing Consequences from the FTC After Failing to Follow Safeguards Rule
Assess
by
Usman Khan
6 Considerations When Choosing a FedRAMP 3PAO Provider
Assess
by
Ben Strauss
6 Considerations When Choosing a FedRAMP 3PAO Provider
Assess
by
Ben Strauss
Top 4 reasons you need FedRAMP Certification
Assess
by
Samantha Dizor Carter
Top 4 reasons you need FedRAMP Certification
Assess
by
Samantha Dizor Carter
Top 2021 Cybersecurity Predictions
Assess
by
Usman Khan
Top 2021 Cybersecurity Predictions
Assess
by
Usman Khan
FedRAMP, FISMA, and SOC 2... What's the Difference?
Assess
by
Ben Strauss
FedRAMP, FISMA, and SOC 2... What's the Difference?
Assess
by
Ben Strauss
Is Compliance Scanning Still Relevant?
Assess
by
Ben Strauss
Is Compliance Scanning Still Relevant?
Assess
by
Ben Strauss
Your guide to creating a Third-Party Risk Management Program to assess your vendors
Assess
by
Usman Khan
Your guide to creating a Third-Party Risk Management Program to assess your vendors
Assess
by
Usman Khan
Incident Response Self-Assessment
Assess
by
Bilal Khan
Incident Response Self-Assessment
Assess
by
Bilal Khan
Keys to A Successful Onsite Vendor Assessment for your TPRM program
Assess
by
Kelley Grogan
Keys to A Successful Onsite Vendor Assessment for your TPRM program
Assess
by
Kelley Grogan
Understand the role fourth-party vendors play in your risk profile
Assess
by
Abby Costin
Understand the role fourth-party vendors play in your risk profile
Assess
by
Abby Costin
6 Ways to Get Started with Your Fourth-Party Vendor Program
Assess
by
Johnny Vaughn
6 Ways to Get Started with Your Fourth-Party Vendor Program
Assess
by
Johnny Vaughn
How the CMMC Shows a Greater Focus on Third-Party Risk Management
Assess
by
Abby Costin
How the CMMC Shows a Greater Focus on Third-Party Risk Management
Assess
by
Abby Costin
How to get started with DFARS and FISMA compliance
Assess
by
Ben Strauss
How to get started with DFARS and FISMA compliance
Assess
by
Ben Strauss
Succeeding with FedRAMP: Continuous Monitoring
Assess
by
Samantha Dizor Carter
Succeeding with FedRAMP: Continuous Monitoring
Assess
by
Samantha Dizor Carter
Inherent Risk Tiering for Third-Party Vendor Assessments
Assess
by
Adam Cummings
Inherent Risk Tiering for Third-Party Vendor Assessments
Assess
by
Adam Cummings
The AWS Shared Security Model - Part II: A Step Towards FedRAMP Compliance
Assess
by
Samantha Dizor Carter
The AWS Shared Security Model - Part II: A Step Towards FedRAMP Compliance
Assess
by
Samantha Dizor Carter
Hacking Hillary: Recent Breaches against Democratic Political Groups
Assess
by
Bryan Watkins
Hacking Hillary: Recent Breaches against Democratic Political Groups
Assess
by
Bryan Watkins
Electronic Voting for the 21st Century
Assess
by
Samantha Dizor Carter
Electronic Voting for the 21st Century
Assess
by
Samantha Dizor Carter
The AWS Shared Responsibility Model: Security in the Cloud
Assess
by
Samantha Dizor Carter
The AWS Shared Responsibility Model: Security in the Cloud
Assess
by
Samantha Dizor Carter
FedRAMP Compliance – Is it worth it?
Assess
by
Samantha Dizor Carter
FedRAMP Compliance – Is it worth it?
Assess
by
Samantha Dizor Carter
Current State of FISMA Part 3: What Is the Target?
Assess
by
Matt Shepherd
Current State of FISMA Part 3: What Is the Target?
Assess
by
Matt Shepherd
A Follow-up on Quantitative Risk Analysis
Assess
by
Matt Shepherd
A Follow-up on Quantitative Risk Analysis
Assess
by
Matt Shepherd
A Requirement By Any Other Name....
Assess
by
Terry Grogan
A Requirement By Any Other Name....
Assess
by
Terry Grogan
Current State of FISMA Part 2: The Chasm Between Compliance and...Everyone Else
Assess
by
Matt Shepherd
Current State of FISMA Part 2: The Chasm Between Compliance and...Everyone Else
Assess
by
Matt Shepherd
Current State of FISMA Part 1: FISMA-bashing
Assess
by
Matt Shepherd
Current State of FISMA Part 1: FISMA-bashing
Assess
by
Matt Shepherd
Current State of FISMA Series
Assess
by
Matt Shepherd
Current State of FISMA Series
Assess
by
Matt Shepherd
Ready to talk all things cybersecurity?
Contact Us