Solutions
By Industry
Cloud Services
Financial Services
Government
Healthcare
By Role
CIO and CISO
DevSecOps
IT Operations
Security
By Need
Cybersecurity Transformation
Cybersecurity Hygiene
Data Security and Privacy
FedRAMP
Governance, Risk, and Compliance
ICAM
Incident Response
Penetration Testing
Security Automation
Managed SOC
Vulnerability Management
Services
Assess
Assessments
Cyber Hygiene Health Check
CMMC and C3PAO
Framework and Policy
FedRAMP and 3PAO
Third-Party Risk Management
Protect
Cyber Hunting
Red Teaming
Penetration Testing
Phishing and Social Engineering
Vulnerability Management
Zero Trust
Respond
Incident Response
Managed SOC
Transform
GRC Advisory
Security Architecture
SOC Optimization
Automate
ATO Automation
Baseline Modernization
Security Optimization
Products
Ansible Counselor
Accelerate your automation journey
Lockdown Enterprise
STIG and CIS compliance automation using Ansible
Policy and Procedure Templates for FedRAMP
Guided support to help you achieve FedRAMP authorization
Resources
Blog
Automation
Penetration Testing
Risk Management
Vulnerability Management
FedRAMP
News
Datasheets and Whitepapers
Downloadables about our Solutions, Products, and Solutions
Company
Why MPG
Careers
Customers
Team
Partnering
Contract Vehicles
Community
Contact Us
Capability Statement
We're Hiring
Protect
View All
Company
Events
Automate
Transform
Assess
Protect
Respond
Insider Threat – Closing Security Gaps
Protect
by
Joshua Brink
Insider Threat – Closing Security Gaps
Protect
by
Joshua Brink
What Is An Insider Threat?
Protect
by
Hailey Frazier
What Is An Insider Threat?
Protect
by
Hailey Frazier
What Is Zero Trust?
Protect
by
Hailey Frazier
What Is Zero Trust?
Protect
by
Hailey Frazier
Securing Your Home Office From IoT Devices With Zero Trust Architecture
Protect
by
Bruce Taylor
Securing Your Home Office From IoT Devices With Zero Trust Architecture
Protect
by
Bruce Taylor
Securing Company Data in a Remote Workforce with Zero Trust
Protect
by
Bruce Taylor
Securing Company Data in a Remote Workforce with Zero Trust
Protect
by
Bruce Taylor
Ask A Pen Tester: What Is Vishing?
Protect
by
Kory Ponting
Ask A Pen Tester: What Is Vishing?
Protect
by
Kory Ponting
Ask A Pen Tester: What Are DDOS Attacks?
Protect
by
Kory Ponting
Ask A Pen Tester: What Are DDOS Attacks?
Protect
by
Kory Ponting
Ask A Pen Tester: What Are Packet Sniffing & Black Hole Attacks?
Protect
by
Kory Ponting
Ask A Pen Tester: What Are Packet Sniffing & Black Hole Attacks?
Protect
by
Kory Ponting
Ask A Pen Tester (Gross Acronym Edition): What Are VOMIT & SPIT?
Protect
by
Kory Ponting
Ask A Pen Tester (Gross Acronym Edition): What Are VOMIT & SPIT?
Protect
by
Kory Ponting
Ask A Pen Tester: What Are Phreaking Attacks & Toll Fraud?
Protect
by
Kory Ponting
Ask A Pen Tester: What Are Phreaking Attacks & Toll Fraud?
Protect
by
Kory Ponting
Password Strength and Complexity: Assessing Security and Practicality
Protect
by
Curtis Wilkins
Password Strength and Complexity: Assessing Security and Practicality
Protect
by
Curtis Wilkins
High-Risk Vulnerability Discovery LocalFileInclusion SAS
Protect
by
Elwood Buck
High-Risk Vulnerability Discovery LocalFileInclusion SAS
Protect
by
Elwood Buck
The SolarWinds Sunburst Supply Chain Attack
Protect
by
Usman Khan
The SolarWinds Sunburst Supply Chain Attack
Protect
by
Usman Khan
4 types of phishing and how to protect your organization
Protect
by
Bilal Khan
4 types of phishing and how to protect your organization
Protect
by
Bilal Khan
4 Things to Know About the NIST Phish Scale
Protect
by
Elaine Toennies
4 Things to Know About the NIST Phish Scale
Protect
by
Elaine Toennies
WebTA XXE Version 5.0.4 Vulnerability
Protect
by
Elwood Buck
WebTA XXE Version 5.0.4 Vulnerability
Protect
by
Elwood Buck
HPE 3PAR Authentication Bypass Vulnerability
Protect
by
Elwood Buck
HPE 3PAR Authentication Bypass Vulnerability
Protect
by
Elwood Buck
Phishing & Elections: 4 Ways to Protect Your Data During Election Season
Protect
by
Abby Costin
Phishing & Elections: 4 Ways to Protect Your Data During Election Season
Protect
by
Abby Costin
How to Protect Your Employee SIM Cards from Hackers
Protect
by
Abby Costin
How to Protect Your Employee SIM Cards from Hackers
Protect
by
Abby Costin
3 Access Management Models and Why They’re Important
Protect
by
Abby Costin
3 Access Management Models and Why They’re Important
Protect
by
Abby Costin
WebTA PrivEsc Vulnerability
Protect
by
Elwood Buck
WebTA PrivEsc Vulnerability
Protect
by
Elwood Buck
WebTA SQLi Vulnerability
Protect
by
Elwood Buck
WebTA SQLi Vulnerability
Protect
by
Elwood Buck
HPE 3PAR Security Vulnerability
Protect
by
Elwood Buck
HPE 3PAR Security Vulnerability
Protect
by
Elwood Buck
What’s the difference between Pen Testing, Red Teaming, and Threat Hunting?
Protect
by
Abby Costin
What’s the difference between Pen Testing, Red Teaming, and Threat Hunting?
Protect
by
Abby Costin
How to Hack Through a Pass-Back Attack: MFP Hacking Guide
Protect
by
Elwood Buck
How to Hack Through a Pass-Back Attack: MFP Hacking Guide
Protect
by
Elwood Buck
A CISO's Guide to Secure Remote Work
Protect
by
Abby Costin
A CISO's Guide to Secure Remote Work
Protect
by
Abby Costin
3 Vulnerabilities to be on the Lookout for to protect your data
Protect
by
Kory Ponting
3 Vulnerabilities to be on the Lookout for to protect your data
Protect
by
Kory Ponting
5 Tips for staying secure while online shopping for the holidays
Protect
by
Abby Costin
5 Tips for staying secure while online shopping for the holidays
Protect
by
Abby Costin
Using CSPs to Reduce Front-End Attack Vectors
Protect
by
Paolo Fragomeni
Using CSPs to Reduce Front-End Attack Vectors
Protect
by
Paolo Fragomeni
XXE Vulnerability in BlackBerry AtHoc (Networked Crisis Communication) Platform
Protect
by
Nolan Kennedy
XXE Vulnerability in BlackBerry AtHoc (Networked Crisis Communication) Platform
Protect
by
Nolan Kennedy
REST Assured: Penetration Testing REST APIs Using Burp Suite: Part 3 – Reporting
Protect
by
Kory Ponting
REST Assured: Penetration Testing REST APIs Using Burp Suite: Part 3 – Reporting
Protect
by
Kory Ponting
REST Assured: Penetration Testing REST APIs Using Burp Suite: Part 2 - Testing
Protect
by
Kory Ponting
REST Assured: Penetration Testing REST APIs Using Burp Suite: Part 2 - Testing
Protect
by
Kory Ponting
REST Assured: Penetration Testing REST APIs Using Burp Suite: Part 1 – Introduction & Configuration
Protect
by
Kory Ponting
REST Assured: Penetration Testing REST APIs Using Burp Suite: Part 1 – Introduction & Configuration
Protect
by
Kory Ponting
Social Engineering Part 3: Phishing
Protect
by
MPG Blog
Social Engineering Part 3: Phishing
Protect
by
MPG Blog
Social Engineering Part 2: Open-Source Intelligence (OSINT)
Protect
by
MPG Blog
Social Engineering Part 2: Open-Source Intelligence (OSINT)
Protect
by
MPG Blog
A Tale of Two Tools: When Splunk met SecurityCenter
Protect
by
Safi Mojidi
A Tale of Two Tools: When Splunk met SecurityCenter
Protect
by
Safi Mojidi
Hardware Vulnerability: Understanding Spectre, Meltdown and the Price of Unchecked Modernization
Protect
by
Andrew Nowak
Hardware Vulnerability: Understanding Spectre, Meltdown and the Price of Unchecked Modernization
Protect
by
Andrew Nowak
Conducting and Detecting Data Exfiltration
Protect
by
MPG Blog
Conducting and Detecting Data Exfiltration
Protect
by
MPG Blog
CloudFront Hijacking
Protect
by
Matt Westfall
CloudFront Hijacking
Protect
by
Matt Westfall
Lateral Movement with PSExec
Protect
by
Jonathan Renard
Lateral Movement with PSExec
Protect
by
Jonathan Renard
Voter Privacy vs. the Security of the Electronic Voting System
Protect
by
Samantha Dizor Carter
Voter Privacy vs. the Security of the Electronic Voting System
Protect
by
Samantha Dizor Carter
Open or Closed: The Data on Your Mobile Device is Still Accessible
Protect
by
Jonathan Foster
Open or Closed: The Data on Your Mobile Device is Still Accessible
Protect
by
Jonathan Foster
A Holistic Approach to Insider Threat
Protect
by
MPG Blog
A Holistic Approach to Insider Threat
Protect
by
MPG Blog
BCDR Series: The intersection of Incident Response and Business Continuity
Protect
by
Eliot Schmidt
BCDR Series: The intersection of Incident Response and Business Continuity
Protect
by
Eliot Schmidt
BCDR Series: Retail Resilience - Retailers Suffer Major Outages Ahead of Holiday Season
Protect
by
Eliot Schmidt
BCDR Series: Retail Resilience - Retailers Suffer Major Outages Ahead of Holiday Season
Protect
by
Eliot Schmidt
Privilege Escalation via Group Policy Preferences (GPP)
Protect
by
Jonathan Renard
Privilege Escalation via Group Policy Preferences (GPP)
Protect
by
Jonathan Renard
Are You Under Attack? Exploring the Home Network Perimeter
Protect
by
Matt Westfall
Are You Under Attack? Exploring the Home Network Perimeter
Protect
by
Matt Westfall
Information Security & Personal Responsibility
Protect
by
Matt Shepherd
Information Security & Personal Responsibility
Protect
by
Matt Shepherd
10 Steps to Successful Privileged Access Management – Part 3
Protect
by
Aaron Kraus
10 Steps to Successful Privileged Access Management – Part 3
Protect
by
Aaron Kraus
10 Steps to Successful Privileged Access Management – Part 2
Protect
by
Brandon Ritze
10 Steps to Successful Privileged Access Management – Part 2
Protect
by
Brandon Ritze
10 Steps to Successful Privileged Access Management - Part 1
Protect
by
Akintola DaSilva
10 Steps to Successful Privileged Access Management - Part 1
Protect
by
Akintola DaSilva
An Aside on Classified Information Handling
Protect
by
Matt Shepherd
An Aside on Classified Information Handling
Protect
by
Matt Shepherd
Security Metrics as a Clothing Size??
Protect
by
Matt Shepherd
Security Metrics as a Clothing Size??
Protect
by
Matt Shepherd
Open Source Security Appliance Reviews (Post 1 in Series)
Protect
by
Thanh Vu
Open Source Security Appliance Reviews (Post 1 in Series)
Protect
by
Thanh Vu
Implementing Security Monitoring in Small and Mid-sized Organizations
Protect
by
Dan Shepherd
Implementing Security Monitoring in Small and Mid-sized Organizations
Protect
by
Dan Shepherd
The Difficulty In Doing Something Simple
Protect
by
Matt Shepherd
The Difficulty In Doing Something Simple
Protect
by
Matt Shepherd
Pen Testing Versus Vulnerability Assessments
Protect
by
Matt Shepherd
Pen Testing Versus Vulnerability Assessments
Protect
by
Matt Shepherd
Physical Security Breach
Protect
by
Matt Shepherd
Physical Security Breach
Protect
by
Matt Shepherd
Ready to talk all things cybersecurity?
Contact Us