Principle Logic Logo
  • Home
  • About
  • Services
  • Resources
  • Blog
  • Contact

Kevin Beaver's Security Blog

  • Outsourcing security monitoring, guest wireless network risks, and more infosec content to help your business

    31 Mar 2017

    I can’t believe that I recently submitted my 1,000th article…it’s been a long time coming! I first started writing in 2001 and it has been one of the best things I ever did. Thanks so much for your support over the years!

    Here’s some new content I’ve written for the nice folks over at Toolbox.com (Ziff Davis) that you might be interested in:
     
    Outsource your security monitoring/alerting and be done with it
     

    Are your guest wireless networks exposing your business?
     

    Assessing the risks of information at rest and information in transit

    Explaining discrepancies in different security assessment reports

    Why DAST and SAST are necessary if software is solid from the get-go

    When hacked home computers become business problems


    Check out all of my other content at www.principlelogic.com.

    Cheers!

Resources

  • My books
  • My blogs and columns
  • My articles, podcasts, and webcasts
  • My downloadable book chapters
  • My currently-published whitepapers and guides

Client Testimonials

“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)
Read More

 

I’ve written/co-written 12 books on information security including:

 

Tags

AI appsec basics books Career Networking careers censorship cervical instability CISO CISSP cities coronavirus covid-19 cybersecurity data breaches eagle syndrome hacking Hacking For Dummies heads in sand health helmet communications incident response information risk keynote speaker leadership macOS NCAA football networking passwords Power Four rare diseases resilience Russian hacking security culture security leadership security speaker social engineering speaking engagements sql injection tethered spinal cord tiktok time management vulnerability and penetration testing web security zero-based thinking

© Copyright 2001-present, Principle Logic, LLC - All Rights Reserved.

  • Home
  • About
  • Services
  • Resources
  • Blog
  • Contact