Filtered by: Cybersecurity
41 1

Our Take: 2016 Security Trends

As a cloud solutions integrator, we are laser-focused on security. The Data Breach Investigations Report (DBIR) by Verizon is our favorite, single piece of research for keeping up-to-date. 2016 marks their…

The Cybersecurity Roadmap

Improving your cybersecurity posture is a journey. Don't be frozen by where to start. Transcend the traditional security monitor and utilize real-time, all-time analytics for security. To download a copy…

Cybersecurity

Cyber attacks damage reputations, destroy customer trust, and affect revenues. Read to learn cybersecurity best practices to keep your data, and reputation, secure.

Configuring Patches By Hand Invites Hacks

You Think Your Patching Strategy Is Good Enough? If your organization is breached because you have a missing patch, it is not only embarrassing, it can get you fired. We…

Why Cybersecurity Requires DevOps

Consider for a moment this data spanning 7 years, showing that there are constants in cybersecurity trends. A 2008 report demonstrated that 62% of all data breaches were caused by…

The Consequences of Cybersecurity Complacency

To download a copy of the Consequences of Cybersecurity Complacency, please click on the image below.

Secure Private Cloud Capability Launch: 2015 AFCEA TechNet

Our wise robot, Techie, is here to alert you to valuable information: a secure private cloud solution accredited for operation on Army networks is available today from Kinney Group, Inc. Kinney Group, Inc. (KGI) exhibited at the AFCEA TechNet Cyber Convergence event August 25-27, 2015 in Augusta, GA and personnel briefed attendees on…

Disk is Dead: Forward Thinking Themes for Building Next Generation Federal Data Centers

“As I grew up working in the restaurant business, I learned at an early age that if you delight the customer with an unexpected experience, great things can happen,” opines…