Kevin Beaver is an independent information security consultant, expert witness, professional speaker, and author with over 25 years of experience in IT -- the last 17 of which has been dedicated to information security. Before starting Principle Logic in 2001, Beaver served in various information technology and security roles for several healthcare, e-commerce, financial firms, educational institutions, and consulting organizations.
Kevin Beaver has presented at seminars and conferences hundreds of times and is a top-rated information security speaker at shows for TechTarget, Gartner, RSA, CSI, SecureWorld Expo and The IIA. Additionally, Beaver has performed over three dozen webcasts for TechTarget, and other publishers, has authored or co-authored ten information security books including Hacking For Dummies – one of the all-time best-selling information security books– as well as Hacking Wireless Networks For Dummies, Securing the Mobile Enterprise For Dummies, Laptop Encryption For Dummies, and PCI Cardholder Data Protection For Dummies (all by Wiley) as well as The Definitive Guide to Email Management and Security (Realtimepublishers.com) and The Practical Guide to HIPAA Privacy and Security Compliance (Auerbach). In addition, Beaver is the technical editor of the book Network Security For Dummies (Wiley) as well as over a dozen books and whitepapers for Realtimepublishers.com.
Kevin Beaver is a regular contributor of information security content for SearchEnterpriseDesktop.com, SearchCompliance.com, SearchWindowsServer.com, SearchWinIT.com among others and has also written for Information Security Magazine and Computerworld.com.
Contributions from Kevin Beaver
- Will testing services like uTest make software secure?
- Build Web apps to withstand denial-of-service attacks
- Get the most security out of forms-based authentication
- Third-party application security is vulnerable to flaws
- Why IT auditors and Web developers have disconnected goals
- Get management on board with securing software vulnerabilities
- Mobile access management: New platform, same problems
- Expert advice on cloud application security issues
- Network security threats are not to be ignored
- Look out for these mobile application security threats
- Hybrid security: Beyond pen testing, static analysis
- Mobile app software: Avoid the cycle of insecurity
- Security lesson: Beating web application threats
- Security lesson: How to test for common security faults
- Common software security oversights school
- Hacking For Dummies: Hacking Methodologies, Chapter 4
- Can security testing only happen in the production environment?
- The secrets to getting started in your software testing
- Building solid security requirements
- How to gather security requirements for software projects and what to look for