Solutions
By Industry
Cloud Services
Financial Services
Government
Healthcare
By Role
CIO and CISO
DevSecOps
IT Operations
Security
By Need
Cybersecurity Transformation
Cybersecurity Hygiene
Data Security and Privacy
FedRAMP
Governance, Risk, and Compliance
ICAM
Incident Response
Penetration Testing
Security Automation
Managed SOC
Vulnerability Management
Services
Assess
Assessments
Cyber Hygiene Health Check
CMMC and C3PAO
Framework and Policy
FedRAMP and 3PAO
Third-Party Risk Management
Protect
Cyber Hunting
Red Teaming
Penetration Testing
Phishing and Social Engineering
Vulnerability Management
Zero Trust
Respond
Incident Response
Managed SOC
Transform
GRC Advisory
Security Architecture
SOC Optimization
Automate
ATO Automation
Baseline Modernization
Security Optimization
Products
Ansible Counselor
Accelerate your automation journey
Lockdown Enterprise
STIG and CIS compliance automation using Ansible
Policy and Procedure Templates for FedRAMP
Guided support to help you achieve FedRAMP authorization
Resources
Blog
Automation
Penetration Testing
Risk Management
Vulnerability Management
FedRAMP
News
Datasheets and Whitepapers
Downloadables about our Solutions, Products, and Solutions
Company
Why MPG
Careers
Customers
Team
Partnering
Contract Vehicles
Community
Contact Us
Capability Statement
We're Hiring
Abby Costin
Phishing & Elections: 4 Ways to Protect Your Data During Election Season
Protect
Apr 30, 2022
by
Abby Costin
Phishing & Elections: 4 Ways to Protect Your Data During Election Season
Protect
October 5, 2020
by
Abby Costin
How to Protect Your Employee SIM Cards from Hackers
Protect
Apr 30, 2022
by
Abby Costin
How to Protect Your Employee SIM Cards from Hackers
Protect
September 15, 2020
by
Abby Costin
3 Access Management Models and Why They’re Important
Protect
Apr 30, 2022
by
Abby Costin
3 Access Management Models and Why They’re Important
Protect
August 14, 2020
by
Abby Costin
What’s the difference between Pen Testing, Red Teaming, and Threat Hunting?
Protect
Apr 30, 2022
by
Abby Costin
What’s the difference between Pen Testing, Red Teaming, and Threat Hunting?
Protect
June 2, 2020
by
Abby Costin
Security Baseline and Compliance Automation Webinar
Automate
Apr 30, 2022
by
Abby Costin
Security Baseline and Compliance Automation Webinar
Automate
April 21, 2020
by
Abby Costin
A CISO's Guide to Secure Remote Work
Protect
Apr 30, 2022
by
Abby Costin
A CISO's Guide to Secure Remote Work
Protect
April 3, 2020
by
Abby Costin
Ready to talk all things cybersecurity?
Contact Us