Blog

Header_strip
blog-bg-shape

Posts about:

Security Research

Intro to SOC 2
Overview In a world where security is as much a hot topic for organiza...
Read More
Apache Log4j 2 Vulnerability - Log4Shell
The K logix Testing Services team wanted to share that a critical vuln...
Read More
IGA in 2021: How Security Leaders Can Tackle This Challenge
Identity and Access Management (IAM) – it’s a buzzword that we’ve hear...
Read More
Strategic Guide to the Latest MITRE Endpoint Evaluations
MITRE Engenuity ATT&CK Evaluations It’s that time of year again – ...
Read More
IAM: Making Sense of a Complex Marketspace
Identity and Access Management (IAM) is a strategic goal for many CISO...
Read More

    Subscribe

    Stay up to date with cyber security trends and more