ISP Blog

July 13, 2020
WebTA SQLi Vulnerability

Critical WebTA SQLi Vulnerability Discovery Details This blog covers a recent security vulnerability found by a team of Pen Testers...

Read More
July 9, 2020
HPE 3PAR Security Vulnerability

Critical HPE 3PAR Vulnerability Discovery Details This blog covers a recent security vulnerability found by a team of Pen Testers...

Read More
July 1, 2020
MindPoint Group Diversity and Inclusion Statistics

A look at our strive toward a diverse culture and how we plan to expand In this blog, Humaira, MPG’s...

Read More
June 22, 2020
STIG vs. CIS part 2: Selecting the Best Baseline for Your Business

This blog is part 2 of our multi-post blog series on STIG vs. CIS. In this second post, we’re continuing to unpack the differences...

Read More
June 22, 2020
STIG vs. CIS part 1: The Anatomy of Baselines and Compliance

This blog is part 1 of our multi-post blog series on STIG vs. CIS. In this series, we will give...

Read More
June 22, 2020
A Day in the life of a Business Development Manager at MindPoint Group

What is it Like to Work on the MindPoint Group Growth Team ? This month we’re interviewing Ben Strauss, a...

Read More
June 2, 2020
What’s the difference between Pen Testing, Red Teaming, and Threat Hunting?

At first glance, it seems like pen testing, red teaming, and threat hunting all seem like a fancy way of saying the...

Read More
May 7, 2020
A Day in the Life of a TPRM Analyst

What it’s like to be a Third-Party Risk Management (TPRM) Analyst This month we’re interviewing Kelley Grogan, a Third-Party Risk...

Read More
April 28, 2020
How to Hack Through a Pass-Back Attack

A Pen Tester’s Guide to Printer Hacking What is an MFP anyway? Multi-Function Peripherals (MFPs) are an underutilized target in...

Read More
April 21, 2020
Security Baseline and Compliance Automation Webinar

How to Overcome Compliance Barriers with Security Automation Overview: We’ll be honest with you, compliance is hard. Between shifting compliance...

Read More
April 14, 2020
Keys to A Successful Onsite Vendor Assessment for your TPRM program

How Onsite Assessments fit into your TPRM Strategy TPRM and Third-Party Vendor Assessments Third-Party Risk is a major concern for many organizations, especially...

Read More
April 3, 2020
A CISO’s Guide to Secure Remote Work

How to Ensure security while your Workforce is Remote Due to the recent COVID-19 outbreak, many people are now working from home for the first...

Read More
12 3 4 ... Last