Posts about:

Resources (5)

What you need to know about Shellshock
What is it? Shellshock is the codename for a collection of recently di...
Read More
RSA Authentication Manager 8.1 Upgrade/Migration
Are you running RSA Authentication Manager 6.1 or 7.1? Did you know th...
Read More
Tips for Ethical Hacking
I am often asked how I became an ethical hacker, so I have put togethe...
Read More
K logix & SANS
K logix offers security services and technology solutions strategicall...
Read More
K logix Take on Top 20 SANS Critical Controls: Control #10
Critical Control #10: Secure Configurations for Network Devices such a...
Read More
The Importance of an Effective Security Strategy
  At K logix, we speak with our clients often about maintaining a rele...
Read More
Dispelling the Myths Behind DDoS Attacks
I recently read the below article on by Jay Bains (CT...
Read More
Go for the No: How a Selling Strategy Helps Get the Ear of your Executives
  I was recently at an auction for my daughter’s elementary school. Th...
Read More
4 Tips for Keeping Pace in the Security Industry
  Challenge number one for many of our clients is simply keeping pace ...
Read More
5 Great Computer Security Tips that Few People Follow
    Below is an article published in Net-Security by Corey Nachreiner ...
Read More
K logix Spotlights Security Risk Analysis
Helps Organizations Align security Programs with Business Goals Most I...
Read More
The Real Cost of Data Loss
The Real Cost of Data Loss is a report from K logix which defines the ...
Read More


    Stay up to date with cyber security trends and more