58 Posts

Kevin Beaver

Independent Information Security Consultant

Kevin Beaver is an information security consultant, writer and professional speaker with Atlanta-based Principle Logic, LLC. With over 28 years of experience in IT and 22 years specializing in security, Kevin performs independent security assessments and helps businesses uncheck the boxes that keep creating a false sense of security. He has authored/co-authored 12 books on information security, including the best-selling "Hacking For Dummies" and "The Practical Guide to HIPAA Privacy and Security Compliance." In addition, Kevin is the creator of the Security On Wheels information security audiobooks and blog providing security learning for IT professionals on the go. You can learn more and link to Kevin's articles, blog posts, videos and more at his website, www.principlelogic.com.

Written By Kevin Beaver

The Top Ways Cybercriminals Infiltrate Retailers’ Systems and Steal Customer Data

Retailers are tasked with protecting the customer data that resides within their point-of-sale systems. But what is the best way to prevent breaches?

Employee Risk: Dealing With Risky Network Users

How organizations manage employee risk will depend heavily on their security awareness programs, identity governance and other existing protocols.

The Mishandling of Sensitive Data: Do You Really Know What You Don’t Know?

Carelessness with data handling creates many unnecessary risks. Here are some examples of this neglect and what you can do about it.

Security Decision-Making: When Decisions Are Based on Fear Rather Than Fact

When it comes to decision-making, are security professionals motivated negatively by fear and misinformation or positively by facts and common sense?

Sorting Through the Hype of Next-Generation Firewalls

Ask the right questions of both your organization and your security vendor before taking the plunge with next-generation firewalls.

Don’t Overlook This Key Element in Securing the Internet of Things

You absolutely must think long-term when it comes to the Internet of Things (IoT) because these systems aren't going anywhere anytime soon.

Addressing Your Security Program One Small Step at a Time

Organizations can form an effective security program by following a few basic best practices and dedicating themselves to a long-term effort.

When Vendor Security Vulnerabilities Become Your Own

Vendor security vulnerabilities can quickly become a major problem for your business, and it's up to you to minimize the risks involved.