Blog 3

Tech Company of the Year Nominee at the 2016 TechPoint Mira Awards

Kinney Group is proud, excited, and humbled to announce we are nominated for Tech Company of the Year for the 2016 Mira Awards. From 168 applications, independent judging panels selected 98 companies,…

2016 Gameplan: Indy Splunk User Group

The purpose of the Splunk User Group is for individuals to connect with like-minded people who are passionate about Splunk technology. Group updates to discuss for 2016: NEW Splunk User…

Featured Category

Cybersecurity

Cyber attacks damage reputations, destroy customer trust, and affect revenues. Read to learn cybersecurity best practices to keep your data, and reputation, secure.

The Cybersecurity Roadmap

Improving your cybersecurity posture is a journey. Don't be frozen by where to start. Transcend the traditional security monitor and utilize real-time, all-time analytics for security. To download a copy…

Capability Statement

We harness the power of IT in the cloud to improve lives. But, what does that actually mean? Our Capability Statement below provides a detailed, one-page snapshot of what we…

The Current Security Reality

Consider the following data. From October 2014 to February 2015, which is a span of 5 months, there were 4 breaches that resulted in over 82 million people with compromised…

Why Cybersecurity Requires DevOps

Consider for a moment this data spanning 7 years, showing that there are constants in cybersecurity trends. A 2008 report demonstrated that 62% of all data breaches were caused by a significant manual error or an internal mistake. A 2015 report found that over the past 11 years, 96% of…

The Consequences of Cybersecurity Complacency

To download a copy of the Consequences of Cybersecurity Complacency, please click on the image below.