Linux security

You may need to do a quick third-party registration to access certain ones.

Articles
Podcasts
  • Tightening down Linux security
    Listen to this podcast to learn about some of the most prevalent security risks to Linux environments today. Gain insight into network devices beyond the server system that need security protection. Discover how to tighten your Linux security and minimize long-term information risks.
Webcasts
  • Tightening down Linux security
    Watch this webcast to learn about some of the most prevalent security risks to Linux environments today. Gain insight into network devices beyond the server system that need security protection. Discover how to tighten your Linux security and minimize long-term information risks.

Client Testimonials

"A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)