Category

Cloud Computing
Cybersecurity may seem like a foreign language to many executives and organizations who are not well versed on the subject. Despite how much you need cybersecurity, you don’t know what you don’t know. Do you have a strategy to minimize your risk? Are you seeking an expert to give your organization top tier cybersecurity direction?...
Read More
Our world is mobile. You work in the office and everywhere else, using our mobile devices. What happens beyond your office’s firewall?  Are you secure inside your work environment? What about in the wild? Without endpoint security on your devices, you are vulnerable. What is endpoint security? Endpoint security is essential to the protection of...
Read More
By Stan Lowe of Zscaler If there’s one thing we can predict for certain for 2019, it’s that cyber criminals will continue to spin up more and more innovative ways to exploit gaps in security. The hackers have IoT devices on their radar, and they’ll keep on looking to the cloud for new opportunities to...
Read More
Written by: Pooja Deshmukh from Zscaler Are you a frequent traveler? If so, you probably participate in at least one rewards program in which you accrue airline miles or earn hotel points. The hospitality industry practically invented these loyalty programs and they’ve been enormously popular, delivering value to customers and merchants alike. It turns out, membership account...
Read More
Happy Cyber Monday from team AGT! Here’s a tip for todays internet shopper. Any website can be attacked by hackers, but limiting your shopping to established and trusted vendors limits your exposure. Bookmark the most trusted online retail sites to make sure you don’t get redirected to fakes. 
Read More
Written by: Jen Toscano of Zscaler The last installment in our series on the five critical elements of branch transformation is elastic scalability. In a cloud context, scalability allows your business to be nimble because cloud infrastructure and apps automatically keep up with your requirements no matter how large they become. Security stays strong and...
Read More
Written by Jackie Castelli from CrowdStrike- While there is much discussion today about potential weaknesses in the hardware supply chain, given the recent attacks attributed to China, the software supply chain has already proven to be vulnerable with numerous attacks covered. Yet, even though these attacks seem to be making headlines more frequently, they are far...
Read More
Fal.Con 2018 POWER UP Conference The second annual CrowdStrike Cybersecurity Conference, Fal.Con 2018, has wrapped up at the Fontainebleau in Miami Beach, Florida.  The POWER UP conference brought together some of the top cybersecurity professionals and industry experts from around the world from September 17-19th. As a CrowdStrike partner, the Ascension Global Technology team is...
Read More
Black Hat 2018 and DEF CON 26
AGT Blog | The annual DEF CON and Black Hat Conference brings together some of the greatest security researchers and instructors from around the world, providing security information in a vendor neutral environment. The back-to-back conferences recently wrapped up in Las Vega, Nevada, for 2018
Read More
1 2 3