84 Posts

Kevin Beaver

Independent Information Security Consultant

Kevin Beaver is an information security consultant, writer, and professional speaker with Atlanta-based Principle Logic, LLC. With over 29 years of experience in IT and 23 years specializing in security, Kevin performs independent security assessments and consulting to help businesses uncheck the boxes that keep creating a false sense of security. He has authored/co-authored 12 books on information security, including the best-selling "Hacking For Dummies" and "The Practical Guide to HIPAA Privacy and Security Compliance." In addition, Kevin is the creator of the Security On Wheels information security audiobooks and blog providing security learning for IT professionals on the go. You can learn more and link to Kevin's articles, blog posts, videos and more at his website, www.principlelogic.com.

Written By Kevin Beaver

Security Awareness Training Should Always Lead to Changes in Behavior

It's important to recognize that a core outcome of security awareness and training efforts needs to be changing behaviors.

How to Make Third-Party Risk Management Second Nature

Organizations that sleep on third-party risk management could unknowingly expose their systems to remote attacks, access risks and more.

Set Expectations and Boundaries With Your Security Program to Minimize Risk

Good communication, clear expectations and enforced boundaries are all key to the success of your security program.

Why You Should Integrate IoT Security Into Your Vulnerability Management Program

Many IT professionals and executives alike are not addressing IoT security at the same level at which it's creating tangible business risks.

Maximize Your Defenses by Fine-Tuning the Oscillation of Cybersecurity Incidents

In the information security field, we're always practicing finding vulnerabilities, keeping threats at bay, responding to cybersecurity incidents and minimizing long-term business risks.

There Is No Perfect Time to Tackle Security Tasks, So Don’t Wait Until It’s Too Late

With so many fires to put out every day, it can be tempting to put off less urgent security tasks, exposing the enterprise to preventable risks.

How to Check for Blind Spots in Your Security Program

An effective security program does more than merely take on the appearance of cyber resilience. Learn how to look behind the curtain of your enterprise security.

Major Application Security Oversights You Can’t Afford

Many IT teams have developed a habit of treating application security as an afterthought. As a result, it might be their greatest vulnerability.

5 Tips to Bring Colleagues on Board With Information Security Systems

The more employees and business leaders are involved with your information security systems, the more long-term buy-in you'll have when it comes to following security policies and best practices.

Cybersecurity Skills Aren’t Just for Security Professionals Anymore

Real security improvement comes when everyone in the workplace, not just IT and security professionals, is serious about practicing cybersecurity skills and habits.