59 Posts

Kevin Beaver

Independent Information Security Consultant

Kevin Beaver is an information security consultant, writer and professional speaker with Atlanta-based Principle Logic, LLC. With over 28 years of experience in IT and 22 years specializing in security, Kevin performs independent security assessments and helps businesses uncheck the boxes that keep creating a false sense of security. He has authored/co-authored 12 books on information security, including the best-selling "Hacking For Dummies" and "The Practical Guide to HIPAA Privacy and Security Compliance." In addition, Kevin is the creator of the Security On Wheels information security audiobooks and blog providing security learning for IT professionals on the go. You can learn more and link to Kevin's articles, blog posts, videos and more at his website, www.principlelogic.com.

Written By Kevin Beaver

Figuring Out What Happened After a Data Breach

So you know a data breach has occurred — now what? Here's what security leaders need to ask when responding to a network event.

Waiting Until the Last Minute to Implement Long-Term Security Measures

Sometimes we rush to implement what could be long-term security measures, which opens up the enterprise to a host of unintended consequences.

Why the Lack of Professional Development Among IT and Security Pros?

There's a lack of resources and opportunities for IT and security teams to engage in professional development, but it doesn't have to be that way.

The Importance of a Security Culture Across the Organization

An enterprise's security culture can have a major impact on how well the actually security practices are implemented, enforced and maintained.

High-Impact Security Flaws and Why They’re Still Being Overlooked

Seemingly simple security flaws can cause major damage for organizations, most often in the form of massive data breaches caused by the vulnerability.

Common Mobile App Vulnerabilities You May Be Overlooking

There are a few common mobile app vulnerabilities that enterprises may be overlooking even as they complete security tests. Here's a few to watch out for.

When a Security Policy Creates More Problems Than It Solves

The presence of a written security policy create a dangerous facade. Your organization must go beyond mere documentation to achieve strong cybersecurity.

The Danger in Downplaying Smartphone Security

Enterprises can't afford to sweep smartphone security under the rug. In the age of bring-your-own-device, mobile security is essential.

Spotting the Trouble Ahead With Proper Visibility Into Your Network

Enterprises with visibility into their networks are in a better position to fight advanced threats and prevent damaging data breaches.

Ask the Tough Questions About Near-Field Communication Security and Privacy

Both enterprises and customers alike need to ask questions about the security and privacy issues surrounding near-field communication.