Blog 4

The Current Security Reality

Consider the following data. From October 2014 to February 2015, which is a span of 5 months, there were 4 breaches that resulted in over 82 million people with compromised…

Why Cybersecurity Requires DevOps

Consider for a moment this data spanning 7 years, showing that there are constants in cybersecurity trends. A 2008 report demonstrated that 62% of all data breaches were caused by…

Featured Category

Cybersecurity

Cyber attacks damage reputations, destroy customer trust, and affect revenues. Read to learn cybersecurity best practices to keep your data, and reputation, secure.

The Consequences of Cybersecurity Complacency

To download a copy of the Consequences of Cybersecurity Complacency, please click on the image below.

Secure Private Cloud Capability Launch: 2015 AFCEA TechNet

Our wise robot, Techie, is here to alert you to valuable information: a secure private cloud solution accredited for operation on Army networks is available today from Kinney Group, Inc. Kinney Group, Inc.…

Welcome to Kinney Group’s Blog: “HUB”

Welcome to HUB: a center of activity, with ports and connections to help you explore IT topics that matter for organizations. HUB is an exclusive view into what Kinney Group…

Disk is Dead: Forward Thinking Themes for Building Next Generation Federal Data Centers

“As I grew up working in the restaurant business, I learned at an early age that if you delight the customer with an unexpected experience, great things can happen,” opines Jim Kinney, President and CEO of Kinney Group. Kinney founded Kinney Group, Inc. (KGI) with midwestern sensibility and a vision…

Splunk License Estimations

Over the years I have searched for a tool that will allow me to size a customer’s Splunk license quickly and accurately. I have even attempted to manually and accurately…