December 4, 2020
FedRAMP, FISMA, and SOC 2… What’s the Difference?

FedRAMP vs. FISMA vs. SOC 2: Similarities and Differences FISMA, FedRAMP, and SOC 2 are common IT Security terms, often bandied around interchangeably by...

Read More
October 21, 2020
Is Compliance Scanning Still Relevant?

What is Compliance Scanning?  Compliance scanning is the method used to ensure that system configuration is compliant with security policy controls. Unlike vulnerability scanning, which picks up...

Read More
October 2, 2020
How we Married Compliance Automation with Policy-as-Code: A GitLab Love Story

We recently had the join of partaking in GitLab Commit — a conference held by our friends at GitLab and...

Read More
October 1, 2020
Answers with Ansible: Automation in the Age of COVID-19

In this blog post, we highlight the webinar “Answers with Ansible: Automation in the Age of Covid-19” that MindPoint Group...

Read More
August 27, 2020
HIPAA Compliance vs. Security…Why Not Both?

Happy Birthday, HIPAA! An Ode to the Intersection of Compliance and Security The recent celebration of HIPAA’s birthday inspired us...

Read More
August 14, 2020
3 Access Management Models and Why They’re Important

Your guide to the Bell-LaPadula, Biba, and Chinese Wall Access Management Models What is Access Management?  Access Management is all about making...

Read More
June 22, 2020
STIG vs CIS part 1: The Anatomy of Baselines and Compliance

STIG vs CIS This blog is part 1 of our multi-post blog series on STIG vs CIS. In this series,...

Read More
April 23, 2020
Compliance or Engineering: Cybersecurity’s Chicken & the Egg

Compliance-First or Engineering-First Approach? What came first, the chicken or the egg?  This common idiom befuddles many issues amongst philosophical...

Read More
April 21, 2020
Security Baseline and Compliance Automation Webinar

How to Overcome Compliance Barriers with Security Automation Webinar Overview: We’ll be honest with you, compliance is hard. Between shifting...

Read More
February 28, 2020
How the CMMC Shows a Greater Focus on Third-Party Risk Management

CMMC & Third-Party Risk Management  Comply or Say Goodbye  If you’re not familiar with the Cybersecurity Maturity Model Certification (CMMC), you’re not alone—but for those...

Read More
February 24, 2020
A Day in the life at MPG: Governance, Risk, and Compliance Manager

What it’s like to Work as a Governance, Risk, and Compliance Manager This month we’re interviewing Anita Walker, a Governance, Risk, and Compliance (GRC) Manager at MindPoint Group (MPG) and...

Read More
February 14, 2020
3 Ways to Prepare for CMMC

3 Ways to Prepare for CMMC The Cybersecurity Maturity Model Certification (CMMC) is a recent mandate from the Department of Defense (DoD) for all vendors to...

Read More
12 3