Innovative Minds - On Point - One Group  

Cloud

This is the blog for MindPoint Group's Information Security & Privacy (ISP) division. We hope to use this to contribute to and debate ideas among the ISP community.
02
Jan
2019

2018 YEAR IN REVIEW: Open Source Collaboration

By:

Supporting Open Source At MindPoint Group we recognize the value that open source software provides and we work to support it in several ways. First, we support open source software by making our own contributions to the community. Much of the software we write is open, available for use, and published in our GitHub organization.

Read More

28
Sep
2018

Unconventional Automation: Ansible for FedRAMP

By:

Ansible today is more powerful than it has ever been. Over the past few years it has taken the IT automation world by storm. For sure there are other automation technologies that are ‘better’ or more ‘performant’ within certain niches. But as a general-purpose, one-size-fits-most automation solution, Ansible is the dominant technology. One area where Ansible

Read More

26
Sep
2018

VMware Provisioning and Automation with Ansible

By:

All, in just a week I am going to be at AnsibleFest in Austin, TX to give a talk and see what others are doing. As part of Fest this year, Ansible wants people to share their automation stories. I wanted to give a quick look at mine as a way of introducing the VMWare

Read More

18
Jul
2018

A Tale Of Two Tools: When Splunk met SecurityCenter

By:

Co-Authors:  Keith Rhea and Alex Nanthavong It was the best of times, it was the worst of times, it was the age of technological advancements, it was the age of attack, it was the epoch of cybercrime, it was the epoch of opportunity, it was the season of Remediation, it was the season of Exploitation,

Read More

03
Apr
2018

CloudFront Hijacking

By:

I recently spent some time exploring the issue of CloudFront domain hijacking. This is not a new issue but I think it has gone mostly unnoticed for a few reasons: CloudFront’s default behavior is not intuitive. Some standard DNS configurations can mislead users into thinking that their vulnerable domains are configured correctly.   In the

Read More