75 Posts

Kevin Beaver

Independent Information Security Consultant

Kevin Beaver is an information security consultant, writer, and professional speaker with Atlanta-based Principle Logic, LLC. With over 29 years of experience in IT and 23 years specializing in security, Kevin performs independent security assessments and consulting to help businesses uncheck the boxes that keep creating a false sense of security. He has authored/co-authored 12 books on information security, including the best-selling "Hacking For Dummies" and "The Practical Guide to HIPAA Privacy and Security Compliance." In addition, Kevin is the creator of the Security On Wheels information security audiobooks and blog providing security learning for IT professionals on the go. You can learn more and link to Kevin's articles, blog posts, videos and more at his website, www.principlelogic.com.

Written By Kevin Beaver

High-Impact Security Flaws and Why They’re Still Being Overlooked

Seemingly simple security flaws can cause major damage for organizations, most often in the form of massive data breaches caused by the vulnerability.

Common Mobile App Vulnerabilities You May Be Overlooking

There are a few common mobile app vulnerabilities that enterprises may be overlooking even as they complete security tests. Here's a few to watch out for.

When a Security Policy Creates More Problems Than It Solves

The presence of a written security policy create a dangerous facade. Your organization must go beyond mere documentation to achieve strong cybersecurity.

The Danger in Downplaying Smartphone Security

Enterprises can't afford to sweep smartphone security under the rug. In the age of bring-your-own-device, mobile security is essential.

Spotting the Trouble Ahead With Proper Visibility Into Your Network

Enterprises with visibility into their networks are in a better position to fight advanced threats and prevent damaging data breaches.

Ask the Tough Questions About Near-Field Communication Security and Privacy

Both enterprises and customers alike need to ask questions about the security and privacy issues surrounding near-field communication.

Information Security Is Not Stagnant, but Dynamic

Information security has changed drastically in a short amount of time, but defense strategies are not keeping pace with its dynamic nature.

The Top Ways Cybercriminals Infiltrate Retailers’ Systems and Steal Customer Data

Retailers are tasked with protecting the customer data that resides within their point-of-sale systems. But what is the best way to prevent breaches?

Employee Risk: Dealing With Risky Network Users

How organizations manage employee risk will depend heavily on their security awareness programs, identity governance and other existing protocols.

The Mishandling of Sensitive Data: Do You Really Know What You Don’t Know?

Carelessness with data handling creates many unnecessary risks. Here are some examples of this neglect and what you can do about it.