Blog 4

2016 Gameplan: Indy Splunk User Group

The purpose of the Splunk User Group is for individuals to connect with like-minded people who are passionate about Splunk technology. Group updates to discuss for 2016: NEW Splunk User…

The Cybersecurity Roadmap

Improving your cybersecurity posture is a journey. Don't be frozen by where to start. Transcend the traditional security monitor and utilize real-time, all-time analytics for security. To download a copy…

Featured Category

Cybersecurity

Cyber attacks damage reputations, destroy customer trust, and affect revenues. Read to learn cybersecurity best practices to keep your data, and reputation, secure.

Configuring Patches By Hand Invites Hacks

You Think Your Patching Strategy Is Good Enough? If your organization is breached because you have a missing patch, it is not only embarrassing, it can get you fired. We…

Capability Statement

The Current Security Reality

Consider the following data. From October 2014 to February 2015, which is a span of 5 months, there were 4 breaches that resulted in over 82 million people with compromised…

Why Cybersecurity Requires DevOps

Consider for a moment this data spanning 7 years, showing that there are constants in cybersecurity trends. A 2008 report demonstrated that 62% of all data breaches were caused by…

The Consequences of Cybersecurity Complacency

To download a copy of the Consequences of Cybersecurity Complacency, please click on the image below.

Time to Celebrate the Year of the Unexpected Experience

For Kinney Group, 2015 was the year of executing and delivering the Unexpected Experience to our customers, partners, and colleagues. We could not have done so without being grounded in our…