79 Posts

Kevin Beaver

Independent Information Security Consultant

Kevin Beaver is an information security consultant, writer, and professional speaker with Atlanta-based Principle Logic, LLC. With over 29 years of experience in IT and 23 years specializing in security, Kevin performs independent security assessments and consulting to help businesses uncheck the boxes that keep creating a false sense of security. He has authored/co-authored 12 books on information security, including the best-selling "Hacking For Dummies" and "The Practical Guide to HIPAA Privacy and Security Compliance." In addition, Kevin is the creator of the Security On Wheels information security audiobooks and blog providing security learning for IT professionals on the go. You can learn more and link to Kevin's articles, blog posts, videos and more at his website, www.principlelogic.com.

Written By Kevin Beaver

Determining the Scope of Your Security Testing

Organizations often struggle with defining the scope of their security testing, but this is a necessary step that impacts business goals.

What Can’t Go On With Security: How Stein’s Law Impacts Your Information Security Program

Stein's Law says that if something cannot go on forever, it won't. That even applies to your enterprise security program and its risk posture.

Information Security Across Industries: What’s Hot?

There are hot information security topics that are taking hold throughout various industries, and it's important to have a grasp on these concepts.

Why IT and Security Staff Need the Time and Budget to Go to Security Conferences

Attending security conferences gives employees experience and connections that can help both themselves and their employers succeed.

Is Your Company Focusing on the Right Security Trends?

Attending security conferences and other industry events can give you a close-up look at what security trends to watch for the remainder of the year.

Top 10 Security Priorities For Spring and Summer 2016

Here are 10 top elements of security you should be paying attention to this year, as told by the sessions at the 2016 RSA Conference.

From the 2016 RSA Conference: What Security Controls Should You Be Concerned With?

As a security professional, what themes and trends presented at the 2016 RSA Conference should have your attention as you build out security programs?

The One Thing Criminal Hackers Have on Their Side That You Don’t

Criminal hackers have nothing but time to carry out cyberattacks, whereas security professionals must respond quickly with limited resources.

The Disconnect Between Zero-Day Exploits and Security Audits and Penetration Tests

Preventing zero-day exploits is a tall order, even with the help of regular security audits and penetration tests taking place within an organization.

Setting and Achieving Realistic Information Security Program Goals for 2016

The path to cybersecurity success in 2016 begins and ends with setting realistic, actionable goals for your organization's security program.