80 Posts

Kevin Beaver

Independent Information Security Consultant

Kevin Beaver is an information security consultant, writer, and professional speaker with Atlanta-based Principle Logic, LLC. With over 29 years of experience in IT and 23 years specializing in security, Kevin performs independent security assessments and consulting to help businesses uncheck the boxes that keep creating a false sense of security. He has authored/co-authored 12 books on information security, including the best-selling "Hacking For Dummies" and "The Practical Guide to HIPAA Privacy and Security Compliance." In addition, Kevin is the creator of the Security On Wheels information security audiobooks and blog providing security learning for IT professionals on the go. You can learn more and link to Kevin's articles, blog posts, videos and more at his website, www.principlelogic.com.

Written By Kevin Beaver

Maximize Your Defenses by Fine-Tuning the Oscillation of Cybersecurity Incidents

In the information security field, we're always practicing finding vulnerabilities, keeping threats at bay, responding to cybersecurity incidents and minimizing long-term business risks.

There Is No Perfect Time to Tackle Security Tasks, So Don’t Wait Until It’s Too Late

With so many fires to put out every day, it can be tempting to put off less urgent security tasks, exposing the enterprise to preventable risks.

How to Check for Blind Spots in Your Security Program

An effective security program does more than merely take on the appearance of cyber resilience. Learn how to look behind the curtain of your enterprise security.

Major Application Security Oversights You Can’t Afford

Many IT teams have developed a habit of treating application security as an afterthought. As a result, it might be their greatest vulnerability.

5 Tips to Bring Colleagues on Board With Information Security Systems

The more employees and business leaders are involved with your information security systems, the more long-term buy-in you'll have when it comes to following security policies and best practices.

Cybersecurity Skills Aren’t Just for Security Professionals Anymore

Real security improvement comes when everyone in the workplace, not just IT and security professionals, is serious about practicing cybersecurity skills and habits.

An Open Letter to Security Managers: Stop Trying to Do It All

Security managers and IT teams today often try to tackle everything in-house, even though they don't always have the skills and resources to run an effective security program.

Why Your Security Policies Could Be Failing Your Business

Over the past three decades in IT, a persistent problem lingers over even the most well-documented enterprise security policies: lackluster implementation.

Why You Shouldn’t Overlook Personal Electronic Devices in Your Enterprise Network

When it comes to protecting personal electronic devices, a strong organizational culture of security, from top management to the most junior employees, is imperative.

Four Steps to Close the Window on Critical Vulnerabilities

Critical vulnerabilities often remain unaddressed when an organization is unwilling to allocate resources to routinely update applications. Take steps now to secure your network against exploitation.