Category

Internet Security
Black Hat 2018 and DEF CON 26
AGT Blog | The annual DEF CON and Black Hat Conference brings together some of the greatest security researchers and instructors from around the world, providing security information in a vendor neutral environment. The back-to-back conferences recently wrapped up in Las Vega, Nevada, for 2018
Read More
Maximize benefits with a cloud-first strategy
Living in a Cloud-First, Mobile World The way we work is changing. Employees are mobile. The modern workforce is no longer strictly bound to the confines of traditional office walls. Thanks to the internet and cloud computing technology, working from home and remotely has never been easier. Organizations that have embraced a cloud-first strategy are...
Read More
zero TRUST security
The Zero-Trust Security Model: The Future of Cybersecurity The way that we live, work and play has changed in today’s mobile, internet and cloud-first world. With the rapid adoption of cloud services and infrastructure, organizations can no longer approach security the way it’s traditionally been done. The modern approach to enterprise security has to accommodate...
Read More
Zenith Live 2018 – Zscaler Cloud Summit The Ascension Global Technology team is proud to have been one of the Zscaler community members in attendance at the very first Zenith Live Cloud Summit. It was an honor and a privilege to be among the ranks of those at the forefront of cloud transformation at Zenith...
Read More
Proofpoint’s Latest Quarterly Threat Report – May 2018, provides an update on the latest observed trends and takeaways on today’s advanced attacks. Here are some of the key takeaways from the report. Email Threats And Email Fraud On The Rise Email fraud is growing in both scale and pervasiveness. Successful email-based attacks can result in...
Read More
Cybersecurity Tips For Business Travelers Get ready to travel with these top cyber security tips. Laptop ☑ Phone ☑ Chargers ☑ Business cards ☑ Toothbrush ☑ Back up files…? Update Software…? When you’re traveling, whether for business or pleasure, chances are you’ll be connecting to unknown networks. That is, unless you’re going on a digital detox and will be spending...
Read More
CLOUD SECURITY
When migrating to – and operating in – the cloud, key considerations for every company are cloud security, compliance, reliability and costs. The benefits of moving business applications into the cloud are very clear. These include efficiencies, scalability and flexibility. However, the cloud also comes with its own unique challenges.  In a cloud-first world the...
Read More
cybersecurity maturity
Do you know how cybersecurity mature your organization is? Perhaps your company has a well-established cyber security program. Maybe your business is about to embark on a digital transformation journey.  In the latter case, the goal is to establish the baseline foundations of security from which to build on.  In the former case, you will...
Read More
Ascension Global Technology Blog - Business Email Compromise
More than you might initially think. But before you rush off to warn your single colleagues, friends and employees about the dangers of online dating, you may like to read CrowdStrike’s latest Intelligence Report, “Nigerian Confraternities Emerge As Business Email Compromise Threat”. The report delves into the observed patterns, operations and criminal gangs behind the...
Read More
The growing number of privacy and data breaches and ransomware attacks making the daily news serve as a cautionary reminder for companies to treat cybersecurity as a top priority.  As companies undergo digital transformation and enjoy the benefits of enabling technology, they are also inevitably exposed to cyber risks. This is simply a reality of...
Read More
1 2