Automation

October 1, 2020
Public Sector on Air: Cybersecurity, Compliance, & Automation with Red Hat

Public Sector on Air features Red Hatters, partners, and customers from public sector entities talking about common problems that need...

Read More
October 1, 2020
Answers with Ansible: Automation in the Age of COVID-19

In this blog post, we highlight the webinar “Answers with Ansible: Automation in the Age of Covid-19” that MindPoint Group...

Read More
August 4, 2020
How to configure and search within the Ansible Tower API using the Ansible URI Module

Dynamically search within the Ansible Tower API Authors: Brennan Stride and George Nalen Ansible Tower API Project Background: During a...

Read More
June 22, 2020
STIG vs CIS part 2: Selecting the Best Baseline for Your Business

This blog is part 2 of our multi-post blog series on STIG vs CIS. In this second post, we’re continuing to unpack the differences...

Read More
June 22, 2020
STIG vs CIS part 1: The Anatomy of Baselines and Compliance

STIG vs CIS This blog is part 1 of our multi-post blog series on STIG vs CIS. In this series,...

Read More
April 23, 2020
Compliance or Engineering: Cybersecurity’s Chicken & the Egg

Compliance-First or Engineering-First Approach? What came first, the chicken or the egg?  This common idiom befuddles many issues amongst philosophical...

Read More
March 20, 2020
4 Ways to increase your security ROI with automation

How and why you should use automation to enforce security compliance  Enterprise IT is a vast network of highly varied, distributed...

Read More
November 21, 2019
How to get started with DFARS and FISMA compliance

There’s an easier way to accelerate compliance If you’re reading this blog, you’re probably already aware of how difficult it...

Read More
November 5, 2019
It’s past time we modernized security hardening procedures

Security baseline automation of STIG and CIS controls with Ansible is improving resource management and compliance With an ever-growing workload...

Read More