Blog

Header_strip
blog-bg-shape
Hope X Conference Takeaways
Edward Snowden and Daniel Ellsberg (bottom-left). (Twitter/Zen Albatro...
Read More
K logix Take on Top 20 SANS Critical Controls: Control #10
Critical Control #10: Secure Configurations for Network Devices such a...
Read More
The Importance of an Effective Security Strategy
At K logix, we speak with our clients often about maintaining a releva...
Read More
K logix mentioned in HealthITSecurity Article
K logix was recently mentioned in the HealthITSecurity article "Develo...
Read More
K logix mentioned in article "Data breaches: Good guys who think like bad guys"
I contributed to the below article "Data breaches: Good guys who think...
Read More
K logix Welcomes Three New Hires
This is a very exciting time at K logix and I'm pleased to welcome thr...
Read More
Dispelling the Myths Behind DDoS Attacks
I recently read the below article on net-security.com by Jay Bains (CT...
Read More
Go for the No: How a Selling Strategy Helps Get the Ear of your Executives
I was recently at an auction for my daughter’s elementary school. The ...
Read More
Highlights from SplunkLive! Boston
We recently attended SplunkLive! Boston, which was a well attended, an...
Read More
4 Tips for Keeping Pace in the Security Industry
Challenge number one for many of our clients is simply keeping pace in...
Read More
5 Great Computer Security Tips that Few People Follow
Below is an article published in Net-Security by Corey Nachreiner (vie...
Read More
Bsides Boston Recap
Ken Smith and Armand Boudreau, two of our expert Solutions Architects,...
Read More
Feats of Strength Spring 2014: Be Confident. The Importance of Being Prepared.
What to read in our latest publication: Three Pillars of Confident Sec...
Read More
Websense User Group Recap
We hosted our second semi-annual Websense User Group to help our clien...
Read More

    Subscribe

    Stay up to date with cyber security trends and more