Top 4 reasons you need FedRAMP Certification
What is FedRAMP, and why is it important for your business The FedRAMP authorization program was created in 2011 to provide a “standardized approach to security...
Read MoreFedRAMP, FISMA, and SOC 2… What’s the Difference?
FedRAMP vs. FISMA vs. SOC 2: Similarities and Differences FISMA, FedRAMP, and SOC 2 are common IT Security terms, often bandied around interchangeably by...
Read MoreIs Compliance Scanning Still Relevant?
What is Compliance Scanning? Compliance scanning is the method used to ensure that system configuration is compliant with security policy controls. Unlike vulnerability scanning, which picks up...
Read MoreHow we Married Compliance Automation with Policy-as-Code: A GitLab Love Story
Public Sector on Air: Cybersecurity, Compliance, & Automation with Red Hat
Public Sector on Air features Red Hatters, partners, and customers from public sector entities talking about common problems that need...
Read MoreAnswers with Ansible: Automation in the Age of COVID-19
In this blog post, we highlight the webinar “Answers with Ansible: Automation in the Age of Covid-19” that MindPoint Group...
Read MoreHIPAA Compliance vs. Security…Why Not Both?
Happy Birthday, HIPAA! An Ode to the Intersection of Compliance and Security The recent celebration of HIPAA’s birthday inspired us...
Read More3 Access Management Models and Why They’re Important
STIG vs CIS part 2: Selecting the Best Baseline for Your Business
This blog is part 2 of our multi-post blog series on STIG vs CIS. In this second post, we’re continuing to unpack the differences...
Read MoreSTIG vs CIS part 1: The Anatomy of Baselines and Compliance
STIG vs CIS This blog is part 1 of our multi-post blog series on STIG vs CIS. In this series,...
Read MoreCompliance or Engineering: Cybersecurity’s Chicken & the Egg
Compliance-First or Engineering-First Approach? What came first, the chicken or the egg? This common idiom befuddles many issues amongst philosophical...
Read MoreSecurity Baseline and Compliance Automation Webinar
Keys to A Successful Onsite Vendor Assessment for your TPRM program
How Onsite Assessments fit into your TPRM Strategy TPRM and Third-Party Vendor Assessments Third-Party Risk is a major concern for many organizations, especially...
Read MoreHow the CMMC Shows a Greater Focus on Third-Party Risk Management
CMMC & Third-Party Risk Management Comply or Say Goodbye If you’re not familiar with the Cybersecurity Maturity Model Certification (CMMC), you’re not alone—but for those...
Read MoreA Day in the life at MPG: Governance, Risk, and Compliance Manager
What it’s like to Work as a Governance, Risk, and Compliance Manager This month we’re interviewing Anita Walker, a Governance, Risk, and Compliance (GRC) Manager at MindPoint Group (MPG) and...
Read More