Kevin Beaver's Profile:

Name:Kevin Beaver
Location:Atlanta, GA
Job Title:IT Security Consultant
Bio: I am an information security consultant with Principle Logic, LLC ( I focus my work on independent security assessments revolving around compliance and minimizing business risks. I'm also a professional speaker and author of over 600 articles and 11 books including Hacking For Dummies. I'm also the creator/producer of Security On Wheels providing security learning for IT professionals on the go (
Area of Expertise:Information Security, Compliance, BYOD, Cloud Computing, IT and Security Careers
Knowledge Points:16,905 pts.   ( How do I earn points? )

Recent Activity by Kevin Beaver:

Making a WAN last updated: 2009-09-30 15:37:59 GMT commented by: Kevin Beaver Exchange 2003 Network Configuration SQL Server 2000 WAN WAN design WAN hardware WAN technologies Windows Server 2003

Cisco Access Point 1242 series last updated: 2009-09-30 15:35:46 GMT commented by: Kevin Beaver Cisco 1242 Cisco Access Points Wireless Access Points Wireless networking

Should we tell our users we’re doing disaster recovery testing? last updated: 2009-09-30 15:33:48 GMT commented by: Kevin Beaver Disaster Preparedness/Recovery Disaster Recovery Disaster recovery (DR) testing DR test

Will cloud applications be certified by IT audit? What kind of applications can we safely offload to the cloud? last updated: 2009-09-30 15:33:05 GMT answered by: Kevin Beaver Cloud Applications Cloud Computing Cloud computing security Cloud-Based Services

How clear is your job role? last updated: 2009-09-30 15:29:21 GMT commented by: Kevin Beaver Career Development Network administration Open IT Forum Windows administration

Green data center: Advice on topology; resources last updated: 2009-09-30 15:26:45 GMT commented by: Kevin Beaver Data center design Data Center management Data Center Topology Green data center

How vulnerable is sensitive information on mobile devices? last updated: 2009-09-29 19:21:23 GMT commented by: Kevin Beaver Data Encryption Mobile device security Mobile security

LINUX Key Audit checklists last updated: 2009-09-24 18:14:48 GMT answered by: Kevin Beaver Linux Linux security Security Audit

Remote control a computer over internet behind Cisco & Broadband router last updated: 2009-09-24 18:13:10 GMT commented by: Kevin Beaver Cisco 280011 Cisco Routers LAN LAN configuration NAT VNC WAN

Security advisories last updated: 2009-09-24 18:09:08 GMT answered by: Kevin Beaver Application security Vulnerability Assessment & Audit

Badges Earned:
Experience by Topic
[ rank ]
[ rank ]
[ rank ]
Microsoft Exchange
[ rank ]
Microsoft Windows
[ rank ]
[ rank ]
[ rank ]
[ rank ]
[ rank ]
[ rank ]
[ rank ]
Windows Server
[ rank ]

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: