Category

Digital Transformation
Written by: Deepen Desai Once seen as the ultimate protection for data being transmitted over the internet, encryption has become a vast playground for cybercriminals. Zscaler ThreatLabZ, the research organization at Zscaler, analyzed the encrypted traffic traversing the Zscaler cloud in the second half of 2018 and prepared a report of our findings. The Zscaler cloud processes...
Read More
Written by: Rainer Rhem Protecting data has become increasingly difficult. Between a lack of awareness, unintended user actions, system glitches, and increasingly sophisticated cyber adversaries, preventing data loss is no mean feat.  With increasing risks and expanding regulations for data protection, organisations must focus on closing security gaps that have emerged in the era of...
Read More
Written by: Yogi Chandiramani of Zscaler The internet is disrupting industries and business models, fundamentally changing the way we live and work in the process. The cloud has also ignited a wave of disruption, which when considered in conjunction with the proliferation of mobile devices, has rendered traditional network and security best practices obsolete. Indeed, as the...
Read More
Cybersecurity may seem like a foreign language to many executives and organizations who are not well versed on the subject. Despite how much you need cybersecurity, you don’t know what you don’t know. Do you have a strategy to minimize your risk? Are you seeking an expert to give your organization top tier cybersecurity direction?...
Read More
Written By Scott Taschler of Crowdstrike Graph databases are having a bit of a moment in cybersecurity. With recent releases from industry juggernauts such as Microsoft and Google/VirusTotal, it seems “graph” could be poised to take center stage as a security industry buzzword and the next must-have cybersecurity technology. However, using a hot technology doesn’t...
Read More
Happy Cyber Monday from team AGT! Here’s a tip for todays internet shopper. Any website can be attacked by hackers, but limiting your shopping to established and trusted vendors limits your exposure. Bookmark the most trusted online retail sites to make sure you don’t get redirected to fakes. 
Read More
Fal.Con 2018 POWER UP Conference The second annual CrowdStrike Cybersecurity Conference, Fal.Con 2018, has wrapped up at the Fontainebleau in Miami Beach, Florida.  The POWER UP conference brought together some of the top cybersecurity professionals and industry experts from around the world from September 17-19th. As a CrowdStrike partner, the Ascension Global Technology team is...
Read More
Black Hat 2018 and DEF CON 26
AGT Blog | The annual DEF CON and Black Hat Conference brings together some of the greatest security researchers and instructors from around the world, providing security information in a vendor neutral environment. The back-to-back conferences recently wrapped up in Las Vega, Nevada, for 2018
Read More
data center decommissioning
Data Center Decommissioning Tips Investing in new equipment, applications, and technology solutions is a top priority for many IT and security professionals. But when it comes to “out with the old and in with the new”, what exactly happens to the old legacy systems, applications and hardware equipment? In this blog post, we look at...
Read More
1 2