Agio's Position

Your go-to for thought leadership on cybersecurity events, trends in managed IT, the cloud, and other hot topics. Stay in the loop.

Read the latest

The Four Dimensions to Cybersecurity That Really Matter
The Four Dimensions to Cybersecurity That Really Matter
Best-in-breed cybersecurity—when it comes to governance, strategy, and tactical execution— rests on four pillars. At Agio, we’ve coined it ADEPT, reflective of Agio Diligence, Expertise, Process, and Technology.
Importance of Client Feedback on Improving Service
Importance of Client Feedback on Improving Service
We get approached from hedge funds and private equity firms about taking over their IT Support from another vendor. Almost always the reason for switching providers is the same – quality of service.
The Time We Hacked a Private Equity Firm…from Their Lobby
The Time We Hacked a Private Equity Firm…from Their Lobby
This test was part of the client’s Cybersecurity Risk Assessment within Agio’s larger SEC Cybersecurity Readiness Program.
In Cybersecurity, Governance Trumps Technology
In Cybersecurity, Governance Trumps Technology
A strong cybersecurity program depends on governance to ensure broad participation, establish clear authority, and enable fully informed decision-making.
Forecasting in the Clouds
Forecasting in the Clouds
Just as weather anomalies have been dominating conversation at the dinner table, another type of cloud has emerged in the mainstream news at a record-setting pace: cloud computing.
Private Equity vs. Hedge Fund: Which Is Harder to Secure?
Private Equity vs. Hedge Fund: Which Is Harder to Secure?
Do private equity firms pose a bigger cybersecurity challenge than hedge funds?
School, Security & SHR Solutions
School, Security & SHR Solutions
Our student records are in danger. Hackers target organizations that have access to personal health information (PHI), meaning educational and health care institutions have a bullseye on their backs.
The CIA Triad of Information Security: Availability
The CIA Triad of Information Security: Availability
The third part of the CIA triad — availability — often surprises people. Contrary to popular belief, being “secure” does not mean locking down your information.
The CIA Triad of Information Security: Integrity
The CIA Triad of Information Security: Integrity
Integrity — doing the “right thing” or adhering to moral values — is such a key part of humanity, and yet many businesses don’t openly commit to it. As the “I” in the CIA triad, integrity is essential to a strong information security program.
The CIA Triad of Information Security: Confidentiality
The CIA Triad of Information Security: Confidentiality
Your organization's information security rests on three key concepts: confidentiality, integrity and availability of resources. The CIA triad is a base standard that every organization needs. In this first blog in a series of three, we examine the nuances of confidentiality.
Meltdown & Spectre
Meltdown & Spectre
News outlets clamored this week to report a severe design flaw in all modern processors, including Intel, AMD, and ARM processors. In sum, the bugs - Meltdown and Spectre - allow applications, malware, and JavaScript running in web browsers, to obtain sensitive data.
The Importance of <br>Physical Security
The Importance of
Physical Security
Every organization should mitigate tangible threats in their area.
National Cybersecurity Awareness Month: Finale
National Cybersecurity Awareness Month: Finale
Sequence of Events If you’re like most, it probably took you 61 days to discover you even had a breach in the first place (we can…
Government Security: Do As I Say, Not As I Do?
Government Security: Do As I Say, Not As I Do?
It’s ironic, then, to note the ones setting the rules and providing guidance on cybersecurity — the U.S. government — aren’t eating their own dog food.
National Cybersecurity Awareness Month: Week 3
National Cybersecurity Awareness Month: Week 3
Weight of the World By 2020, 1.5 billion people across the world will be affected by data breaches (International Data Corporation). 1.9 billion records have been breached…