80 Posts

Kevin Beaver

Independent Information Security Consultant

Kevin Beaver is an information security consultant, writer, and professional speaker with Atlanta-based Principle Logic, LLC. With over 29 years of experience in IT and 23 years specializing in security, Kevin performs independent security assessments and consulting to help businesses uncheck the boxes that keep creating a false sense of security. He has authored/co-authored 12 books on information security, including the best-selling "Hacking For Dummies" and "The Practical Guide to HIPAA Privacy and Security Compliance." In addition, Kevin is the creator of the Security On Wheels information security audiobooks and blog providing security learning for IT professionals on the go. You can learn more and link to Kevin's articles, blog posts, videos and more at his website, www.principlelogic.com.

Written By Kevin Beaver

RSA Tips for CISOs: From 10 Years Ago to Today

CISOs struggling with long-term security challenges can glean some helpful information based off RSA tips presented at this year's conference.

Looking at the Bigger Picture for Your Information Security Program

IT managers must understand how initiatives related to the information security program affect the business side of the organization.

The Role of the CISO and Information Security in the Construction Industry

Many companies fail to recognize the importance of information security in the construction industry. A CISO or CIO is critical to lead security efforts.

The Role of the CISO of a CSP

The CISO of a CSP is crucial to the security of any cloud environment. Many providers, however, rely on the limited expertise of a CTO for IT security.

The Role of the CISO and Information Security in Professional Sports

The implications of information security in professional sports go way beyond X's and O's. Still, many organizations lack a CISO to oversee data security.

The Role of the CISO for Law Firms

This is the first installment in a four-part series about industry CISOs. Be sure to check back next week for the second chapter. Any effective information security program has a dedicated professional in charge. This person is usually the chief...

Dealing With Third-Party Vendor Connections in Your Network

While most third-party vendor connections are harmless and well-intentioned, they can act as footholds for attackers to gain access to your network.

Security Mistakes Executives Make

Executives don't always know best. Some mistakes they make include using weak passwords and failing to follow the same rules as IT professionals.

Why System Administrators Are So Crucial to Security

System administrators are crucial to the health and security of IT environments, yet many get little to no attention until something goes awry.

Handling Code of Conduct and Acceptable Computer Usage Violations

Most companies have rules in place for monitoring computer usage violations, but they're often neither the most practical nor effective systems.