What should you expect from a vCISO engagement?
Organizations are facing ever-increasing challenges related to security and compliance. Security issues are in the news every day with targeted attacks, phishing, malware, and especially ransomware on the increase. A last-minute reaction-based ...
Drive Innovation And Business Value By Streamlining Your It Processes With The Pinnacle Groups’ Total-It Managed Services Offering
The Pinnacle Group’s managed services division provides managed infrastructure, monitoring and management and data protection services customized to fit your business needs. (PRWEB) March 13, 2014 – The Pinnacle Group, a leading national ...
The TPG and NetEnrich partnership is the definition of a trusted business partner.
STAMFORD, CT – OCTOBER 28, 2014 – The Pinnacle Group, a full service provider of tailored IT support services and a CRN SP500 company, today announced a strategic alliance with NetEnrich, Inc., ...
Dakota Cloud Recovery Partners with The Pinnacle Group For Cloud Data Protection Managed Services
The Pinnacle Group will resell Dakota Cloud Recovery solutions as its Cloud Data Protection Managed Services. Together, this partnership brings nationwide customers an enterprise-class IT solution with secure cloud data protection at ...
Your Ears as a Security Control
Recently, I was at a customer site to discuss monitoring, correlation, and alerting. They told a tale that I have heard so many times, all I could do was sit there and ...
Burnin’ Down the House
“Oh my God! The office is on fire!” David exclaimed to his wife as he hung up the phone and drug himself out of bed. This was the moment he had dreaded ...

SOLVED!!!
I was recently fortunate enough to be the face of The Pinnacle Group’s CryptoChallenge at DerbyCon in Louisville Kentucky. I am always amazed to watch the depth of talent brought to bear ...
Tip of the ‘Berg
If you know me, you know that I regularly preach the need for full scope penetration testing (internal and external with physical, digital, and social engineering attack methods). If I do not ...
Do Diligence?
As I travel around speaking, performing network assessments, and discussing security with various corporate leaders, I often hear a fairly consistent and disturbing mantra. “If you find vulnerabilities and risks in our ...