Shadow IT - Why It Matters
How are you sure that your employees are only using approved applications? Odds are, you are not sure at all. This is an issue come to be...
10 Things to Look for in a Mature Penetration Test
Penetration testing is becoming a staple assessment for many organizations as more regulations are requiring third-party assessments and...
Dylan Foos Joins The Mako Group As Network Security Consultant - Penetration Tester
(Detroit) – Dylan Foos has joined The Mako Group as a Network Security Consultant – Penetration Tester. In this position, he will assist...
How To Properly Review A SOC Report
As a follow up to a whitepaper previously written by The Mako Group’s Chief Audit Executive, Shane O’Donnell, let’s dig a little deeper...
Controls In The Cloud - Moving Over Isn't As Easy As Flipping A Switch
Useful tips to keep in mind when migrating to the cloud. It's important to make sure you have the proper controls in place to keep your
Building an Effective Cybersecurity Program
Breaking down cyber fundamentals into usable, real world analogies to demonstrate how to build an effective cybersecurity program.
The Mako Group @RSA Day 3
Recap of Day 3 at the 2019 RSA Conference


The Mako Group @RSA Day 2
Recap of RSA Conference Day 2


The Mako Group @RSA Day 1
RSA Conference Day 1


Kourtney Washer Joins The Mako Group As Strategic Account Executive
Kourtney Washer has joined The Mako Group as Strategic Account Executive