76 Posts

Kevin Beaver

Independent Information Security Consultant

Kevin Beaver is an information security consultant, writer, and professional speaker with Atlanta-based Principle Logic, LLC. With over 29 years of experience in IT and 23 years specializing in security, Kevin performs independent security assessments and consulting to help businesses uncheck the boxes that keep creating a false sense of security. He has authored/co-authored 12 books on information security, including the best-selling "Hacking For Dummies" and "The Practical Guide to HIPAA Privacy and Security Compliance." In addition, Kevin is the creator of the Security On Wheels information security audiobooks and blog providing security learning for IT professionals on the go. You can learn more and link to Kevin's articles, blog posts, videos and more at his website, www.principlelogic.com.

Written By Kevin Beaver

The Role of the CISO and Information Security in Professional Sports

The implications of information security in professional sports go way beyond X's and O's. Still, many organizations lack a CISO to oversee data security.

The Role of the CISO for Law Firms

This is the first installment in a four-part series about industry CISOs. Be sure to check back next week for the second chapter. Any effective information security program has a dedicated professional in charge. This person is usually the chief...

Dealing With Third-Party Vendor Connections in Your Network

While most third-party vendor connections are harmless and well-intentioned, they can act as footholds for attackers to gain access to your network.

Security Mistakes Executives Make

Executives don't always know best. Some mistakes they make include using weak passwords and failing to follow the same rules as IT professionals.

Why System Administrators Are So Crucial to Security

System administrators are crucial to the health and security of IT environments, yet many get little to no attention until something goes awry.

Handling Code of Conduct and Acceptable Computer Usage Violations

Most companies have rules in place for monitoring computer usage violations, but they're often neither the most practical nor effective systems.

An Unfunded Mandate Is Not a Mandate

An unfunded mandate is not a mandate at all — and it's a recipe for a security disaster. Professionals must prepare for this sticky situation.

Determining the Scope of Your Security Testing

Organizations often struggle with defining the scope of their security testing, but this is a necessary step that impacts business goals.

What Can’t Go On With Security: How Stein’s Law Impacts Your Information Security Program

Stein's Law says that if something cannot go on forever, it won't. That even applies to your enterprise security program and its risk posture.

Information Security Across Industries: What’s Hot?

There are hot information security topics that are taking hold throughout various industries, and it's important to have a grasp on these concepts.