Principle Logic Logo
  • Home
  • About
  • Services
  • Resources
  • Blog
  • Contact

Kevin Beaver's Security Blog

  • Penetration Testing and Security Assessment Essentials…Don’t ignore this stuff.

    12 Aug 2016

    Want tips on how to perform better security assessments and penetration tests? Here you go:

    What are the most important security testing basics?

    Determining your scope of security testing

    Best Practices and Tips for Choosing Application Security Testing Tools

    Why ALL of your Web applications need security testing

    It can be dangerous assuming a vulnerability is not a vulnerability

    What constitutes a “critical” security flaw?

    Rely on data center audits alone and you’ll get hit eventually

    What SOC reports won’t tell you (and what you need to do about it)

    Be sure to check out all of my other information security content on my website.

Resources

  • My books
  • My blogs and columns
  • My articles, podcasts, and webcasts
  • My downloadable book chapters
  • My currently-published whitepapers and guides

Client Testimonials

“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)
Read More

 

I’ve written/co-written 12 books on information security including:

 

Tags

AI appsec basics books Career Networking careers censorship cervical instability CIO CISO CISSP cities coronavirus covid-19 cybersecurity data breaches eagle syndrome hacking Hacking For Dummies health helmet communications incident response information risk keynote speaker leadership macOS NCAA football networking passwords Power Four rare diseases resilience Russian hacking security security culture security leadership security speaker social engineering speaking engagements sql injection tethered spinal cord time management vulnerability and penetration testing web security zero-based thinking

© Copyright 2001-present, Principle Logic, LLC - All Rights Reserved.

  • Home
  • About
  • Services
  • Resources
  • Blog
  • Contact