Principle Logic Logo
    770-917-9600
  • Home
  • About
  • Services
  • Resources
  • Blog
  • Contact

Kevin Beaver's Security Blog

  • If you mastered nothing else but this one thing, you’d be ahead of the security curve

    24 Mar 2021

    In my virtual CISO consulting engagements and vulnerability and penetration testing, the process of patch management ALWAYS comes up for discussion. Given the threats, the vulnerabilities, and the risks – everything that’s at stake – I cannot think of any single aspect of a well-functioning information security program that’s more important than patch management. It’s one of a few things in security that you CAN control!

    The absolute last thing you want facilitating an incident or breach is a software patch that could (should) have been applied. Here are some articles that I have written about the subject over the years that may help you with your efforts:

    https://securityintelligence.com/going-through-a-rough-patch-in-your-security-program-consistent-software-patching-can-solve-security-woes/

    https://www.toolbox.com/security/vulnerability-management/blogs/every-smart-security-project-starts-with-a-risk-assessment-032817/

    https://searchwindowsserver.techtarget.com/tip/Windows-Update-for-Business-Breaking-bad-patch-management

    https://searchenterprisedesktop.techtarget.com/tip/Underlying-causes-of-inconsistent-patch-management

    https://www.toolbox.com/tech/it-strategy/blogs/maybe-there-is-a-patch-for-stupid-031315/

    https://www.dummies.com/programming/networking/consistent-patch-management-is-the-first-line-of-defense-against-being-hacked/

    https://www.principlelogic.com/blog/cool-products/the-industrys-first-patch-management-program/

    https://www.toolbox.com/tech/it-strategy/blogs/niche-security-flaws-should-not-be-your-focus-031315/

    https://www.principlelogic.com/blog/hacking/what-happens-when-third-party-patches-are-ignored/

    https://www.toolbox.com/tech/it-strategy/blogs/securitys-new-mo-underimplemented-053116/

    https://www.toolbox.com/tech/tech-security/blogs/defining-the-problem-leads-to-good-security-072919/

    https://www.securityinfowatch.com/home/article/10523887/get-with-it

     

    Cheers!

Resources

  • My books
  • My blogs and columns
  • My YouTube videos
  • My Security On Wheels audio programs
  • My articles, podcasts, and webcasts
  • My downloadable book chapters
  • My currently-published whitepapers and guides
view all

Client Testimonials

“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)
Read More

 

I’ve written/co-written 12 books on information security including:

 

Tags

application security basics books careers CISO CISSP cities compliance coronavirus covid-19 data breaches hacking Hacking For Dummies heads in sand incident response information risk keynote speaker leadership macOS networked cameras patching racing resilience SDLC security culture security leadership security program management security speaker selling security social engineering speaking engagements spec miata sql injection tiktok training vulnerability and penetration testing web security web service api security

© Copyright 2001-present, Principle Logic, LLC - All Rights Reserved.

  • Home
  • About
  • Services
  • Resources
  • Blog
  • Contact

For your convenience I accept