Get the latest from ionix


  • Understanding the NIS 2 Directive 

  • IONIX: Your Partner for DORA Compliance and Cyber Resilience 

  • Important Features Your ASM Tool Must Have – Part 2

  • Asset hijacking: the digital supply chain threat hiding in plain sight

  • Preventing Magecart Attacks Through Supply Chain Vulnerabilities

  • What is the difference between Information Disclosure and Data Exposure

  • Must Have Features Your ASM Platform Must Have – Part 1

  • CVE-2024-3400 – PAN-OS OS Command Injection Vulnerability in GlobalProtect Gateway

  • Continuous Threat Exposure Management (CTEM) – Automation & Management

  • The Difference Between Authentication Bypass and Unauthorized Access

  • Techniques Used in Attack Surface Discovery and the Challenges of Mapping an Organization

  • Redefining Security Validation: How ASM Changes Pen Testing & Red Teaming