76 Posts

Kevin Beaver

Independent Information Security Consultant

Kevin Beaver is an information security consultant, writer, and professional speaker with Atlanta-based Principle Logic, LLC. With over 29 years of experience in IT and 23 years specializing in security, Kevin performs independent security assessments and consulting to help businesses uncheck the boxes that keep creating a false sense of security. He has authored/co-authored 12 books on information security, including the best-selling "Hacking For Dummies" and "The Practical Guide to HIPAA Privacy and Security Compliance." In addition, Kevin is the creator of the Security On Wheels information security audiobooks and blog providing security learning for IT professionals on the go. You can learn more and link to Kevin's articles, blog posts, videos and more at his website, www.principlelogic.com.

Written By Kevin Beaver

Why IT and Security Staff Need the Time and Budget to Go to Security Conferences

Attending security conferences gives employees experience and connections that can help both themselves and their employers succeed.

Is Your Company Focusing on the Right Security Trends?

Attending security conferences and other industry events can give you a close-up look at what security trends to watch for the remainder of the year.

Top 10 Security Priorities For Spring and Summer 2016

Here are 10 top elements of security you should be paying attention to this year, as told by the sessions at the 2016 RSA Conference.

From the 2016 RSA Conference: What Security Controls Should You Be Concerned With?

As a security professional, what themes and trends presented at the 2016 RSA Conference should have your attention as you build out security programs?

The One Thing Criminal Hackers Have on Their Side That You Don’t

Criminal hackers have nothing but time to carry out cyberattacks, whereas security professionals must respond quickly with limited resources.

The Disconnect Between Zero-Day Exploits and Security Audits and Penetration Tests

Preventing zero-day exploits is a tall order, even with the help of regular security audits and penetration tests taking place within an organization.

Setting and Achieving Realistic Information Security Program Goals for 2016

The path to cybersecurity success in 2016 begins and ends with setting realistic, actionable goals for your organization's security program.

Figuring Out What Happened After a Data Breach

So you know a data breach has occurred — now what? Here's what security leaders need to ask when responding to a network event.

Waiting Until the Last Minute to Implement Long-Term Security Measures

Sometimes we rush to implement what could be long-term security measures, which opens up the enterprise to a host of unintended consequences.

Why the Lack of Professional Development Among IT and Security Pros?

There's a lack of resources and opportunities for IT and security teams to engage in professional development, but it doesn't have to be that way.