[email protected]
+1 (855) 531-0135
Logo
  • Services
    • Penetration Testing
    • Vulnerability Assessments
    • Risk & Gap Assessments
    • Policy Review & Development
    • Advisory Services
    • Threat Modelling
    • Security Incident Management
  • Products | Solutions
    • OrbitalCyber
    • SIEM Logging Layer
    • Managed Anti-Virus
    • Network Security
    • End-User Training
  • About
    • Our Team
    • Industries Served
    • Our Partners
    • Conduct & Ethics
  • Blog & Resources
  • Contact Us
Support
  1. Home→
  2. Blog & Resources

Blog & Resources

All the latest news, resources, and blog from Sage ISG and the industry.


Featured image for “How to Securely Handle Passwords on the Linux Command Line”

February 16, 2026

How to Securely Handle Passwords on the Linux Command Line

Stop leaving credentials in your shell history. Here’s a simple, reliable workflow to keep passwords out of logs and history files for good.
  • Tutorials
    /
  • Blog
    /
  • General Cyber Security
    /
  • Linux
    /
Read More
Featured image for “Russia’s Telegram Ban Sends Shockwaves Through Darkweb Marketplaces”

February 12, 2026

Russia’s Telegram Ban Sends Shockwaves Through Darkweb Marketplaces

Over the past week, Sage Infrastructure Solutions Group has observed an 80–90% decline in infostealer logs being advertised across Russian-language Telegram marketplaces — a direct result of the Russian government’s decision to block Telegram and WhatsApp nationwide. As Russia is
  • News
    /
  • Blog
    /
  • Hacking
    /
Read More
Featured image for “Introducing OrbitalCyber”

July 5, 2022

Introducing OrbitalCyber

OrbitalCyber allows customers to deploy vulnerability scanners to internal networks and cloud environments quickly.
  • Blog
    /
Read More
Featured image for “Building an Open Source Secure Web Gateway”

March 8, 2022

Building an Open Source Secure Web Gateway

This tutorial will walk you through the creation of an open source secure web gateway using e2guardian, clamav, and debian 9 stretch.
  • Blog
    /
  • Tutorials
    /
Read More
Featured image for “Third-party IT Risk Exposed”

March 19, 2019

Third-party IT Risk Exposed

As an ISACA and ISC2 certified Cyber Security specialist, I am often asked by customers for advice on how to properly manage risks.
  • Blog
    /
  • Governance and Risk
    /
Read More

Subscribe to our newsletter

Stay ahead of the technology curve and gain a competitive edge by subscribing to our company newsletter.

Sign up today


I agree to receive newsletters, trends, news updates, and promos from Sage Infrastructure.

Sage ISG logo white
Our mission is to protect Canadian businesses. IT is a critical aspect of any business, and the effects of a failure in either IT Infrastructure or IT Security can be disastrous. 

Company

About
Blog
Contact
Terms and Conditions
Privacy Policy

Services

Penetration Testing
Vulnerability Assessments
Risk & Gap Assessments
Policy Review / Development
Advisory Services
Threat Modelling
Security Incident Management

Product | Solutions

OrbitalCyber
SIEM Logging Layer
Managed Anti-Virus
Network Security
End-User Training

Suite 205, 2725 12 St NE,
Calgary, AB T2E 7J2

[email protected]
+1 (855) 531-0135
© 2026 Sage Infrastructure Solutions Group Inc. All Rights Reserved.
Web Design & Development By Full Blast Creative
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}