38 Posts

Kevin Beaver

Independent Information Security Consultant

Kevin Beaver is an information security consultant, expert witness, and professional speaker with Atlanta-based Principle Logic, LLC. With over 26 years of experience in the industry, Kevin specializes in performing independent security assessments revolving around information risk management. He has authored/co-authored 12 books on information security including the best-selling Hacking For Dummies and The Practical Guide to HIPAA Privacy and Security Compliance. In addition, he’s the creator of the Security On Wheels information security audio books and blog providing security learning for IT professionals on the go. You can learn more and link to Kevin's articles, blog posts, videos, and more at his website www.principlelogic.com.

Written By Kevin Beaver

The Role of the CISO and Information Security in the Construction Industry

Many companies fail to recognize the importance of information security in the construction industry. A CISO or CIO is critical to lead security efforts.

The Role of the CISO of a CSP

The CISO of a CSP is crucial to the security of any cloud environment. Many providers, however, rely on the limited expertise of a CTO for IT security.

The Role of the CISO and Information Security in Professional Sports

The implications of information security in professional sports go way beyond X's and O's. Still, many organizations lack a CISO to oversee data security.

The Role of the CISO for Law Firms

This is the first installment in a four-part series about industry CISOs. Be sure to check back next week for the second chapter. Any effective information security program has a dedicated professional in charge. This person is usually the chief...

Dealing With Third-Party Vendor Connections in Your Network

While most third-party vendor connections are harmless and well-intentioned, they can act as footholds for attackers to gain access to your network.

Security Mistakes Executives Make

Executives don't always know best. Some mistakes they make include using weak passwords and failing to follow the same rules as IT professionals.

Why System Administrators Are So Crucial to Security

System administrators are crucial to the health and security of IT environments, yet many get little to no attention until something goes awry.

Handling Code of Conduct and Acceptable Computer Usage Violations

Most companies have rules in place for monitoring computer usage violations, but they're often neither the most practical nor effective systems.

An Unfunded Mandate Is Not a Mandate

An unfunded mandate is not a mandate at all — and it's a recipe for a security disaster. Professionals must prepare for this sticky situation.

Determining the Scope of Your Security Testing

Organizations often struggle with defining the scope of their security testing, but this is a necessary step that impacts business goals.