Principle Logic Logo
    770-917-9600
  • Home
  • About
  • Services
  • Resources
  • Blog
  • Contact

Kevin Beaver's Security Blog

  • How to gain control & become an IoT security expert

    07 Aug 2017

    You’ve no doubt heard the vendor spiels and seen their solutions for gaining control of your Internet of Things environment. But do you truly have IoT under control? Like other things in IT, it can be pretty overwhelming, especially when you’re struggling to keep your arms around your traditional network environment with cloud and mobile and all the complexities they bring. 

    Well, IoT security doesn’t have to be that difficult. It’s complicated in terms of a well-run security program but, in many ways, there’s really nothing new…I can assure you that if you step back to look at the bigger picture of what’s going on with IoT security, from vendor marketing overload to understanding your network to fixing the basics, you can (and will) gain control of IoT if you take a measured approach. 

    Here are several pieces I’ve created on IoT security that can help you in your endeavors:

    Integrating the IoT into your application security program

    Getting Ahead of the IoT Security Curve (an ISACA/TechTarget webinar)

    Don’t overlook this key element in securing the Internet of Things

    Is Your Security Program Ready for the Internet of Things?

    IoT at RSA brings a new focus on old problems

    Securing the Internet of Things

    Top cybersecurity trends for the first half of 2017

    I hope this helps. Don’t hesitate to reach out to me if you’re ever in need of IoT security testing or strategy consulting. Cheers!

Resources

  • My books
  • My blogs and columns
  • My YouTube videos
  • My Security On Wheels audio programs
  • My articles, podcasts, and webcasts
  • My downloadable book chapters
  • My currently-published whitepapers and guides
view all

Client Testimonials

“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)
Read More

 

I’ve written/co-written 12 books on information security including:

 

Tags

application security basics books careers CISO CISSP cities compliance coronavirus covid-19 data breaches hacking Hacking For Dummies heads in sand incident response information risk keynote speaker leadership macOS networked cameras patching racing resilience SDLC security culture security leadership security program management security speaker selling security social engineering speaking engagements spec miata sql injection tiktok training vulnerability and penetration testing web security web service api security

© Copyright 2001-present, Principle Logic, LLC - All Rights Reserved.

  • Home
  • About
  • Services
  • Resources
  • Blog
  • Contact

For your convenience I accept