Innovative Minds - On Point - One Group  

Cyber Security

This is the blog for MindPoint Group's Information Security & Privacy (ISP) division. We hope to use this to contribute to and debate ideas among the ISP community.
06
Dec
2018

REST Assured: Penetration Testing REST APIs Using Burp Suite: Part 3 – Reporting

By:

Welcome back to the REST Assured blog series for Part 3: Reporting. While often overlooked by security professionals, compiling reports is almost always required among penetration testers post-testing. That’s why today we’re going to review how to put all of our findings together and have a thorough paper trail. Reporting Using Burp Suite, it’s relatively

Read More

18
Nov
2018

REST Assured: Penetration Testing REST APIs Using Burp Suite: Part 2 – Testing

By:

Welcome back! In part 1 of REST Assured blog series, we discussed the definitions and history behind APIs, and we reviewed the proper configuring of Burp Suite for conducting security testing against them. In Part 2 of the blog, we’re going to be getting into the fun part: Testing. Testing I’ll preface the testing first

Read More

14
Nov
2018

REST Assured: Penetration Testing REST APIs Using Burp Suite: Part 1 – Introduction & Configuration

By:

Introduction: Hello and welcome to our 3-part blog series where we will take a dive into the technical aspects of conducting exhaustive penetration tests against REST API services and generating reports based on what tests were performed and what our findings are. Due to the subject matter being relatively technical, I’m taking some assumptions in

Read More

28
Sep
2018

Unconventional Automation: Ansible for FedRAMP

By:

Ansible today is more powerful than it has ever been. Over the past few years it has taken the IT automation world by storm. For sure there are other automation technologies that are ‘better’ or more ‘performant’ within certain niches. But as a general-purpose, one-size-fits-most automation solution, Ansible is the dominant technology. One area where Ansible

Read More

20
Sep
2018

Insider Threat Mitigation – Just Players in a Risk Management Game

By:

Let’s meet some actors in this game, shall we?  First, we have Roger, who is angry that his peers have gotten promoted over him and he received a paltry bonus this year.  Roger decided to reset production server accounts to a password only he knows, cover his tracks, and proclaim ignorance when a severe incident

Read More