62 Posts

Kevin Beaver

Independent Information Security Consultant

Kevin Beaver is an information security consultant, writer, and professional speaker with Atlanta-based Principle Logic, LLC. With over 29 years of experience in IT and 23 years specializing in security, Kevin performs independent security assessments and consulting to help businesses uncheck the boxes that keep creating a false sense of security. He has authored/co-authored 12 books on information security, including the best-selling "Hacking For Dummies" and "The Practical Guide to HIPAA Privacy and Security Compliance." In addition, Kevin is the creator of the Security On Wheels information security audiobooks and blog providing security learning for IT professionals on the go. You can learn more and link to Kevin's articles, blog posts, videos and more at his website, www.principlelogic.com.

Written By Kevin Beaver

The Inconvenient Reality of Law Firm Security Challenges

Organizations that take an IT-centric approach to law firm security risk exposing sensitive data to malicious actors and damaging client trust.

Building the Best Incident Response Team

Building the right incident response team means looping in people outside of the IT and security teams.

Security’s Time Management Crunch and How to Solve It

It seems like there's never enough hours in the day for security professionals, but effective time management can positively impact your security posture in unimaginable ways.

Aspects of Security We Need to Be Thankful For

With the seemingly perpetual negativity surrounding security, there's still a lot to be thankful for and admire in today's environment.

The Power of Embracing Change: Why Mobile Payments Are More Secure Than You Think

Although mobile payments are more convenient and arguably more secure than carrying physical credit cards, both retailers and consumers remain wary.

Your Security Awareness Program Stinks. Here’s Something You Can Do About It

IT leaders should eschew traditional, dry security awareness training materials for entertaining content that encourages stronger user engagement.

Make Security Culture Your Top Priority

An organization can have all the technology and expertise money can buy, but a poor security culture can still lead to devastating data breaches.

Don’t Sweep Web Application Penetration Testing Under the Rug

Although it is one of the most crucial components of any security strategy, web application penetration testing is often neglected.

Beyond IT: Finding a Mentor to Help Guide Your Cybersecurity Career

A seasoned, experienced mentor can be an invaluable resource for an aspiring professional looking to start a successful cybersecurity career.

It’s Wise to Specialize: Choosing the Right Path for Your Cybersecurity Career

Before pursuing a cybersecurity career, aspiring security professionals should first determine which areas of expertise they would like to specialize in.