71 Posts

Kevin Beaver

Independent Information Security Consultant

Kevin Beaver is an information security consultant, writer, and professional speaker with Atlanta-based Principle Logic, LLC. With over 29 years of experience in IT and 23 years specializing in security, Kevin performs independent security assessments and consulting to help businesses uncheck the boxes that keep creating a false sense of security. He has authored/co-authored 12 books on information security, including the best-selling "Hacking For Dummies" and "The Practical Guide to HIPAA Privacy and Security Compliance." In addition, Kevin is the creator of the Security On Wheels information security audiobooks and blog providing security learning for IT professionals on the go. You can learn more and link to Kevin's articles, blog posts, videos and more at his website, www.principlelogic.com.

Written By Kevin Beaver

Four Steps to Close the Window on Critical Vulnerabilities

Critical vulnerabilities often remain unaddressed when an organization is unwilling to allocate resources to routinely update applications. Take steps now to secure your network against exploitation.

Why It’s Time to Cross Out the Checklist Approach to Vendor Security

When it comes to vendor security, all the handshakes and paperwork that go into a business deal tend to get in the way of proper audits and thorough vulnerability assessments.

What Security Lessons Can Large Enterprises Learn From Small Businesses?

Large enterprises can learn crucial security lessons from small and midsized organizations — which often have a stronger culture of accountability and responsibility when it comes to data protection.

Discover What Happened After a Security Incident — Without Losing Your Cool

When a dreaded security incident or breach takes place, you'll face your true testing time. Here's how to discover what happened after a security incident — without losing your cool.

What Are the Consequences of Neglecting User Security Training?

Are your user security training efforts working? You may have never paused to think about the relationship your users have with your security program.

Risk Acceptance 101: What Happens When Security Needs Go Unfunded?

The refusal of top leadership to fund security initiatives often translates to explicit, willful risk acceptance.

Insights From RSAC 2018: Taking the Human Element Out of Security

At RSAC 2018, many speakers urged organizations to take the human element out of the security equation as much as possible by investing in automated tools and focusing on professional development.

Signs That Your Security Program Is Going Nowhere Fast

Even if you have all the training, policies and technologies under the sun, your security program is useless if your organization lacks common goals and self-awareness about its defense capabilities.

The Real Reasons Behind Your Web Security Woes

Many organizations still struggle with application and web security due to numerous persistent challenges, most of which relate to lack of oversight, poor planning and human error.

The Inconvenient Reality of Law Firm Security Challenges

Organizations that take an IT-centric approach to law firm security risk exposing sensitive data to malicious actors and damaging client trust.