Blog

Header_strip
blog-bg-shape

Posts about:

Resources (6)

What you need to know about Shellshock
What is it? Shellshock is the codename for a collection of recently di...
Read More
RSA Authentication Manager 8.1 Upgrade/Migration
Are you running RSA Authentication Manager 6.1 or 7.1? Did you know th...
Read More
Tips for Ethical Hacking
I am often asked how I became an ethical hacker, so I have put togethe...
Read More
K logix & SANS
K logix offers security services and technology solutions strategicall...
Read More
K logix Take on Top 20 SANS Critical Controls: Control #10
Critical Control #10: Secure Configurations for Network Devices such a...
Read More
The Importance of an Effective Security Strategy
At K logix, we speak with our clients often about maintaining a releva...
Read More
Dispelling the Myths Behind DDoS Attacks
I recently read the below article on net-security.com by Jay Bains (CT...
Read More
Go for the No: How a Selling Strategy Helps Get the Ear of your Executives
I was recently at an auction for my daughter’s elementary school. The ...
Read More
4 Tips for Keeping Pace in the Security Industry
Challenge number one for many of our clients is simply keeping pace in...
Read More
5 Great Computer Security Tips that Few People Follow
Below is an article published in Net-Security by Corey Nachreiner (vie...
Read More
K logix Spotlights Security Risk Analysis
Helps Organizations Align security Programs with Business Goals Most I...
Read More
The Real Cost of Data Loss
The Real Cost of Data Loss is a report from K logix which defines the ...
Read More

    Subscribe

    Stay up to date with cyber security trends and more