Blog

Black Hat 2018 and DEF CON 26
AGT Blog | The annual DEF CON and Black Hat Conference brings together some of the greatest security researchers and instructors from around the world, providing security information in a vendor neutral environment. The back-to-back conferences recently wrapped up in Las Vega, Nevada, for 2018
data center decommissioning
Data Center Decommissioning Tips Investing in new equipment, applications, and technology solutions is a top priority for many IT and security professionals. But when it comes to “out with the old and in with the new”, what exactly happens to the old legacy systems, applications and hardware equipment? In this blog post, we look at some data center decommissioning tips and considerations. With many organizations migrating to the cloud, data center decommissioning is happening at...
Maximize benefits with a cloud-first strategy
Living in a Cloud-First, Mobile World The way we work is changing. Employees are mobile. The modern workforce is no longer strictly bound to the confines of traditional office walls. Thanks to the internet and cloud computing technology, working from home and remotely has never been easier. Organizations that have embraced a cloud-first strategy are enjoying the benefits of cloud adoption. Organizations that are reluctant to change or failing to fully embrace cloud adoption risk...
zero TRUST security
The Zero-Trust Security Model: The Future of Cybersecurity The way that we live, work and play has changed in today’s mobile, internet and cloud-first world. With the rapid adoption of cloud services and infrastructure, organizations can no longer approach security the way it’s traditionally been done. The modern approach to enterprise security has to accommodate for the increasingly mobile and remote workforce. The future of cybersecurity is Zero-Trust security. Changing the way that we think...
Zenith Live 2018 – Zscaler Cloud Summit The Ascension Global Technology team is proud to have been one of the Zscaler community members in attendance at the very first Zenith Live Cloud Summit. It was an honor and a privilege to be among the ranks of those at the forefront of cloud transformation at Zenith Live 2018 in Las Vegas. The inaugural event, held from June 26th – 27th, was a conference for Zscaler customers,...
Proofpoint’s Latest Quarterly Threat Report – May 2018, provides an update on the latest observed trends and takeaways on today’s advanced attacks. Here are some of the key takeaways from the report. Email Threats And Email Fraud On The Rise Email fraud is growing in both scale and pervasiveness. Successful email-based attacks can result in large direct financial losses to companies.  Companies are increasingly being targeted and are being attacked more frequently. Proofpoint observed that 40%...
Tampa Bay To Bae “Bay To Bae” is Tampa’s newest charity event featuring Tampa Bay’s top eligible bachelors and bachelorettes who are competing to raise money for their charities of their choice.  The Top 20 Bay To Bae “Singles” were announced at a launch party held at the Seminole Hard Rock Hotel and Casino Tampa on Wednesday, 20th June 2018. Delta Munoz, Ascension Global Technology CEO and Founder, was announced as one of the inaugural...
Cybersecurity Tips For Business Travelers Get ready to travel with these top cyber security tips. Laptop ☑ Phone ☑ Chargers ☑ Business cards ☑ Toothbrush ☑ Back up files…? Update Software…? When you’re traveling, whether for business or pleasure, chances are you’ll be connecting to unknown networks. That is, unless you’re going on a digital detox and will be spending all your time away in desert yurt or trekking high up in the mountains… Of course, these scenarios are highly...
Protect Your Brand Is it harder to protect your brand in this digital age? In this new landscape of constant security breaches, companies are fighting to protect their networks from attack and working to preserve their company brand.  Businesses shoulder a responsibility for protecting the growing volume of private customer information. Security Breaches Are Costly IT security breaches are costly; from downtime to response and remediation actions and rebuilding of network systems to return to...
CLOUD SECURITY
When migrating to – and operating in – the cloud, key considerations for every company are cloud security, compliance, reliability and costs. The benefits of moving business applications into the cloud are very clear. These include efficiencies, scalability and flexibility. However, the cloud also comes with its own unique challenges.  In a cloud-first world the security and privacy landscape are different.  Migration, implementation and integrations don’t always go smoothly, and misconfigurations can result in security...