• Skip to primary navigation
  • Skip to main content
  • Skip to footer
RKON

RKON

Private Equity Services

  • About RKON
    • Our Team
    • Our Philosophy
    • Our Partners
    • Testimonials
    • Careers
  • Resources
        • Articles
        • Case Studies
        • Podcasts
        • Video Testimonials
        • Events and Webinars
        • White Papers
        • Datasheets
  • Private Equity
        • Featured

          Project Ransom: Manufacturer Stops Loss of $1M/Day After Security Breach

        • Technology Advisory
          • Artificial Intelligence
          • Due Diligence
          • 100 Day Plan
          • IT Roadmap
          • IT Security & Compliance
          • IT Diagnostic
          • Portfolio Security Assessment
          • Software Engineering
        • Mergers & Acquisitions
          • Carve-Out
          • Platform Creation
          • Post-Merger Integration
  • Enterprise Services
        • IT Advisory
          • Cloud Infrastructure
          • Cloud Journey Roadmap
          • IT Roadmap
          • IT Diagnostic
        • IT Execution
          • Modern Workplace
          • IT Transformation
          • Cloud Migration
          • Microsoft Azure Migration
          • Software Engineering
        • Managed Services
          • IT Help Desk
          • Compliant Cloud
          • Microsoft Azure Management
        • Security Services
          • vCISO
          • Security Assessment
          • Managed Detection Response
          • Security Breach Recovery
          • Cloud Security
          • Identity & Access Management (IAM)
          • Governance Risk & Compliance (GRC)
          • Zero Trust
          • Penetration Testing
  • Contact Us

Technology Articles, Trends & Insights

A trusted source for the latest IT news and trends offering insights & expert opinions

  • Recent Posts
  • AI
  • Cloud
  • Cybersecurity
  • Technology Advisory
  • Managed Services
  • Migrations
  • Strategy
  • AWS

Recent Posts

RKON Names David Wright President to Strengthen Client Delivery and Support Continued Growth

RKON Names David Wright President to Strengthen Client Delivery and Support Continued Growth

February 5, 2026

Chicago, IL — February 5, 2026 — RKON, a leading provider of cloud, cybersecurity, and managed technology services, announced today […]

Read More
Load more
SSH

SSH Authentication with AuthorizedKeysCommand

January 19, 2026

Imagine a world where adding or removing a user’s SSH access was as simple as a single button in AWS. [...]

Read More
GKE workload identity

GKE Workload Identity

January 19, 2026

Traditionally, there have been security challenges with the methods used for Kubernetes workloads running on GKE authenticating to Google Cloud [...]

Read More
VPC service controls

VPC Service Controls in Plain English

January 19, 2026

Google Cloud Platform (GCP) offers powerful security controls to mitigate API-based data exfiltration called VPC Service Controls. To execute a [...]

Read More
SSRF

Exploit SSRF to gain AWS Credentials

January 19, 2026

In the cloud, it’s common to implement decoupled components that integrate and process client data transparently. Without adequate security controls [...]

Read More
Microsoft Marketplace

RKON is now working with customers and ISVs in Microsoft Marketplace

January 19, 2026

Microsoft customers worldwide can now work with RKON to take advantage of the Microsoft Marketplace to increase efficiency, buy confidently, and spend [...]

Read More
MCP server security

MCP Server Security: Navigating the New AI Attack Surface

January 18, 2026

Just as the rise of cloud computing forced a rethink of perimeter-based security, the adoption of large language models (LLMs) [...]

Read More
Github actions

GitHub Actions on AWS: How to Implement Identity Federation

January 16, 2026

Configuring OIDC for GitHub Actions on AWS GitHub Actions offers a feature that allows workflows to generate signed OpenID Connect [...]

Read More
Google cloud platform

Assured Workloads in Google Cloud Platform

January 16, 2026

What is Google Cloud Platform’s Assured Workloads? Google Cloud Platform’s (GCP) Assured Workloads provides a way for control packages to [...]

Read More

Read older articles

AI

Impact of AI on IAM

The Impact of AI and Emerging Technologies on Identity and Access Management

March 26, 2025

Introduction Identity and Access Management (IAM) is a vital module of information systems that verifies the legitimacy of individuals to [...]

Read More
Quiet IT in the Age of AI

Quiet IT in the Age of AI: How AI Will Impact Enterprise Security

November 7, 2024

With the end of the year quickly approaching, industry pundits will undoubtedly start promoting views on the hottest technologies for […]

Read More
2025 Deal Market Trends

2025 Deal Market Trends: Preparing for the Post-Inauguration Buy-Sell Frenzy

November 5, 2024

Since the COVID bubble burst, companies have adapted to decreased demand and spikes in interest rates and inflation. Conditions have […]

Read More
AI Security Best Practices

The Intersection of Generative AI and Security: AI Security Best Practices

September 18, 2024

As generative AI tools like ChatGPT and other advanced models continue to proliferate, organizations are faced with both exciting opportunities […]

Read More
Navigating the Risks of Using Artificial Intelligence for Investment Decisions in Private Equity

Navigating the Risks of Using Artificial Intelligence for Investment Decisions in Private Equity

August 15, 2024

Artificial intelligence (AI) driven decisions allow firms to gain a competitive advantage, and the private equity (PE) industry is no […]

Read More

Cloud

Microsoft Marketplace

RKON is now working with customers and ISVs in Microsoft Marketplace

January 19, 2026

Microsoft customers worldwide can now work with RKON to take advantage of the Microsoft Marketplace to increase efficiency, buy confidently, and spend [...]

Read More
SharePoint's Benefits and the Case for Cloud

SharePoint’s Benefits and the Case for Cloud

June 9, 2022

Many businesses are using the Microsoft 365 Office suite of products, including SharePoint. However, they’re likely also using other file-sharing [...]

Read More
Private vs Public vs Hybrid Cloud Environments Featured

Private vs. Public vs. Hybrid Cloud Environments

August 26, 2021

Organizations moving to cloud environments have increased significantly, especially as more businesses transition to remote work. A cloud environment offers [...]

Read More
Top 5 Cybersecurity Threats by Platform Featured at RKON

Top 5 Cybersecurity Threats by Platform

August 17, 2021

Security breaches and ransomware attacks have come to the forefront in recent months as cybercrime has seen a major increase. […]

Read More
The 3 Cloud Computing Service Models Featured at RKON

The Three Cloud Computing Service Models

August 9, 2021

On-premise IT infrastructures have been the standard practice for businesses around the world for the greater part of the last [...]

Read More
Top 5 Security Risks of Cloud Computing Featured | RKON

Top 5 Security Risks of Cloud Computing

March 18, 2021

A common misconception among organizations looking to move to the cloud is that cloud platforms are inherently secure. However, this [...]

Read More
What is a Cloud Migration Featured at RKON

What is a Cloud Migration?

March 1, 2021

More and more Private Equity, mid-market and fortune 100 companies are migrating their business applications and services to the cloud [...]

Read More
Remote Desktop Vs. Cloud Computing Featured at RKON

Remote Desktop Vs. Cloud Computing

February 22, 2021

Even before the work-from-home fallout of COVID-19 wreaked havoc upon existing IT infrastructures, there was a large push for organizations [...]

Read More

Cybersecurity

Unlocking DoD Contracts Through CMMC Compliance

Unlocking DoD Contracts Through CMMC Compliance

December 29, 2025

What is the Cybersecurity Maturity Model Certification (CMMC) and Why is it Important for DoD Partners? The Cybersecurity Maturity Model [...]

Read More
Penetration testing

Exploring Penetration Testing: PTaaS vs Traditional Pen Testing

July 18, 2025

The field of IT and cybersecurity is fundamentally rooted in the need to safeguard sensitive data and control access to [...]

Read More
Security risk management program

8 Things That You Should Be Considering Today For Your Security Risk Management Program

March 11, 2025

Businesses are experiencing operational disruptions due to increasing technology pressures on multiple fronts; cybersecurity threats are evolving at an unprecedented [...]

Read More
Effective security governance

5 Best Practices for Effective Security Governance

February 24, 2025

What is Governance? Security Governance is a framework through which your organization sets and achieves its security objectives, establishes decision-making [...]

Read More
The Importance of GRC

5 Key Benefits of a GRC Program for Organizational Success

January 24, 2025

The Importance of Governance, Risk, and Compliance (GRC) Governance, Risk Management, and Compliance are vital in guiding and managing an […]

Read More
Top 3 Cybersecurity Trends in 2025

Top 3 Cybersecurity Trends in 2025: What Businesses Need to Know

January 15, 2025

Cybersecurity Trends That Will Impact Operational Efficiency Introduction Changes big and small are happening at every moment in the digital […]

Read More
Quiet IT in the Age of AI

Quiet IT in the Age of AI: How AI Will Impact Enterprise Security

November 7, 2024

With the end of the year quickly approaching, industry pundits will undoubtedly start promoting views on the hottest technologies for […]

Read More
From Curiosity to Cybersecurity: My Journey as a Woman in Tech

From Curiosity to Cybersecurity: My Journey as a Woman in Tech

July 23, 2024

As a woman in cybersecurity, I am often asked what sparked my interest in the field. My answer is simply [...]

Read More

Technology Advisory

The New Era of CISO Influence: How Technology Leaders Can Guide Organizations Through Rapid Change

The New Era of CISO Influence: How Technology Leaders Can Guide Organizations Through Rapid Change

January 16, 2026

In today’s era of rapid technological change, CISOs hold a unique and expanding position of influence. Emerging technologies—especially AI and [...]

Read More
The Role of a vCISO in Modern Organizations

The Role of a vCISO in Modern Organizations

March 11, 2024

In 2023, there were over 2,200 cyber-attacks daily, and these persistent threats affected businesses of all sizes. Whereas cyberattacks in [...]

Read More
Person looking at her three work screens

Decoding Digital Assurance: Securing Your Future in the Digital Landscape

February 11, 2024

Digital Assurance can power progress for your business, whether you're enhancing or maintaining evaluating established IT systems or developing new [...]

Read More
Improve Operations with a Robust BI Strategy

Improve Operations with a Robust BI Strategy

February 10, 2024

According to a recent study, 55% of influential CEOs agree that competing operational priorities are inhibiting the company from changing [...]

Read More
Get the Most from Your Microsoft Investment

Get the Most from Your Microsoft Investment

July 8, 2022

In our last blog about Microsoft SharePoint, we wrote about the need to work smarter, not harder. We’re going to […]

Read More
Break Fast: The Need for an Early Tech Start in PE Deals

Break Fast: The Need for an Early Tech Start in PE Deals

April 6, 2022

After decades of being considered just a cost center, IT is now seen as a value creator. The right use [...]

Read More
The Painful Truth about your High IT Costs Featured at RKON

The Painful Truth About High IT Costs

February 15, 2020

Make IT the hero of your business trajectory. IT is often cast as the villain in most mid-market stories. Instead […]

Read More

Managed Services

Outsourcing IT

When and Why to Outsource: Freeing IT to Deliver Business Value with a Trusted Advisor

September 26, 2025

In today’s digital-first economy, enterprises face unprecedented pressure. Customers demand seamless digital experiences, compliance standards are tightening, and cybersecurity threats […]

Read More
Penetration testing

Exploring Penetration Testing: PTaaS vs Traditional Pen Testing

July 18, 2025

The field of IT and cybersecurity is fundamentally rooted in the need to safeguard sensitive data and control access to [...]

Read More
IT Guide To Managing Your Remote Business Featured at RKON

IT Guide to Managing Your Remote Business

April 11, 2020

COVID-19 has quickly dismantled businesses in terms of operational efficiency and security. Supporting your help desk as companies adjust to [...]

Read More
How Remote Work is Actively Enabling Hackers Featured at RKON

How Remote Work is Enabling Hackers

March 21, 2020

Remote work is enabling a whole new era of infection from cyber threats. Learn how remote working has left businesses […]

Read More
How to Prevent Phishing at RKON

How to Prevent Phishing: Don’t Become a Victim

January 18, 2020

Have you ever received an email with lucrative, eye-catching offers that are too good to be true? Or one from […]

Read More

Migrations

What is a Cloud Migration Featured at RKON

What is a Cloud Migration?

March 1, 2021

More and more Private Equity, mid-market and fortune 100 companies are migrating their business applications and services to the cloud [...]

Read More

Strategy

IAM Assessment

Don’t Wait for a Breach: 7 Reasons to Review Your IAM Maturity Now

June 30, 2025

Uncover the critical benefits of strengthening your IAM framework today—before vulnerabilities become costly incidents Identity and Access Management (IAM) is […]

Read More
Private vs Public vs Hybrid Cloud Environments Featured

Private vs. Public vs. Hybrid Cloud Environments

August 26, 2021

Organizations moving to cloud environments have increased significantly, especially as more businesses transition to remote work. A cloud environment offers [...]

Read More
The Painful Truth about your High IT Costs Featured at RKON

The Painful Truth About High IT Costs

February 15, 2020

Make IT the hero of your business trajectory. IT is often cast as the villain in most mid-market stories. Instead […]

Read More

AWS

SSH

SSH Authentication with AuthorizedKeysCommand

January 19, 2026

Imagine a world where adding or removing a user’s SSH access was as simple as a single button in AWS. [...]

Read More
GKE workload identity

GKE Workload Identity

January 19, 2026

Traditionally, there have been security challenges with the methods used for Kubernetes workloads running on GKE authenticating to Google Cloud [...]

Read More
VPC service controls

VPC Service Controls in Plain English

January 19, 2026

Google Cloud Platform (GCP) offers powerful security controls to mitigate API-based data exfiltration called VPC Service Controls. To execute a [...]

Read More
SSRF

Exploit SSRF to gain AWS Credentials

January 19, 2026

In the cloud, it’s common to implement decoupled components that integrate and process client data transparently. Without adequate security controls [...]

Read More
MCP server security

MCP Server Security: Navigating the New AI Attack Surface

January 18, 2026

Just as the rise of cloud computing forced a rethink of perimeter-based security, the adoption of large language models (LLMs) [...]

Read More
Github actions

GitHub Actions on AWS: How to Implement Identity Federation

January 16, 2026

Configuring OIDC for GitHub Actions on AWS GitHub Actions offers a feature that allows workflows to generate signed OpenID Connect [...]

Read More
Google cloud platform

Assured Workloads in Google Cloud Platform

January 16, 2026

What is Google Cloud Platform’s Assured Workloads? Google Cloud Platform’s (GCP) Assured Workloads provides a way for control packages to [...]

Read More
AWS service control policies

Understanding AWS Service Control Policies

January 16, 2026

Access management within your cloud environment can be one of the most demanding challenges within AWS, with the constant addition [...]

Read More

  • Home
  • About RKON
  • Resources
  • Industries
  • Private Equity
  • Enterprise Services
  • Contact Us
  • RKON’S Digital Privacy

Footer

RKON transparent logo
Find Us on YouTube Find Us on Facebook Find Us on LinkedIn Find Us on Twitter
(312) 654-0300 328 S Jefferson Street #450, Chicago IL, 60661

Subscribe to our email newsletter for news and updates

We use cookies to offer you a better experience and analyze site traffic. By continuing to use this website, you consent to the use of cookies in accordance with our Privacy Policy.