Compliance

January 11, 2021
Top 4 reasons you need FedRAMP Certification

What is FedRAMP, and why is it important for your business The FedRAMP authorization program was created in 2011 to provide a  “standardized approach to security...

Read More
December 4, 2020
FedRAMP, FISMA, and SOC 2… What’s the Difference?

FedRAMP vs. FISMA vs. SOC 2: Similarities and Differences FISMA, FedRAMP, and SOC 2 are common IT Security terms, often bandied around interchangeably by...

Read More
October 21, 2020
Is Compliance Scanning Still Relevant?

What is Compliance Scanning?  Compliance scanning is the method used to ensure that system configuration is compliant with security policy controls. Unlike vulnerability scanning, which picks up...

Read More
October 1, 2020
Public Sector on Air: Cybersecurity, Compliance, & Automation with Red Hat

Public Sector on Air features Red Hatters, partners, and customers from public sector entities talking about common problems that need...

Read More
October 1, 2020
Answers with Ansible: Automation in the Age of COVID-19

In this blog post, we highlight the webinar “Answers with Ansible: Automation in the Age of Covid-19” that MindPoint Group...

Read More
August 27, 2020
HIPAA Compliance vs. Security…Why Not Both?

Happy Birthday, HIPAA! An Ode to the Intersection of Compliance and Security The recent celebration of HIPAA’s birthday inspired us...

Read More
June 22, 2020
STIG vs CIS part 2: Selecting the Best Baseline for Your Business

This blog is part 2 of our multi-post blog series on STIG vs CIS. In this second post, we’re continuing to unpack the differences...

Read More
June 22, 2020
STIG vs CIS part 1: The Anatomy of Baselines and Compliance

STIG vs CIS This blog is part 1 of our multi-post blog series on STIG vs CIS. In this series,...

Read More
April 23, 2020
Compliance or Engineering: Cybersecurity’s Chicken & the Egg

Compliance-First or Engineering-First Approach? What came first, the chicken or the egg?  This common idiom befuddles many issues amongst philosophical...

Read More
April 14, 2020
Keys to A Successful Onsite Vendor Assessment for your TPRM program

How Onsite Assessments fit into your TPRM Strategy TPRM and Third-Party Vendor Assessments Third-Party Risk is a major concern for many organizations, especially...

Read More
February 28, 2020
How the CMMC Shows a Greater Focus on Third-Party Risk Management

CMMC & Third-Party Risk Management  Comply or Say Goodbye  If you’re not familiar with the Cybersecurity Maturity Model Certification (CMMC), you’re not alone—but for those...

Read More
February 24, 2020
A Day in the life at MPG: Governance, Risk, and Compliance Manager

What it’s like to Work as a Governance, Risk, and Compliance Manager This month we’re interviewing Anita Walker, a Governance, Risk, and Compliance (GRC) Manager at MindPoint Group (MPG) and...

Read More
12 3