Kevin Beaver's Profile:

Name:Kevin Beaver
Location:Atlanta, GA
Job Title:IT Security Consultant
Bio: I am an information security consultant with Principle Logic, LLC (www.principlelogic.com). I focus my work on independent security assessments revolving around compliance and minimizing business risks. I'm also a professional speaker and author of over 600 articles and 11 books including Hacking For Dummies. I'm also the creator/producer of Security On Wheels providing security learning for IT professionals on the go (securityonwheels.com).
Blog/Website URL:www.principlelogic.com
Area of Expertise:Information Security, Compliance, BYOD, Cloud Computing, IT and Security Careers
Knowledge Points:15,080 pts.   ( How do I earn points? )

Recent Activity by Kevin Beaver:



Are BYOD programs a security risk?

last updated: 2013-12-09 14:49:24 GMT   |   commented by: Kevin Beaver   |   BYOD, Consumerization, Security

Vendor Security Questions

last updated: 2013-12-09 14:45:15 GMT   |   commented by: Kevin Beaver   |   Network security, Network Security Management, Open IT Forum, Security

How do spammers send email that looks like its from a real company?

last updated: 2013-11-26 19:03:48 GMT   |   commented by: Kevin Beaver   |   Email security, Email servers, Spam

Is it really necessary to block outgoing ports?

last updated: 2013-11-26 18:58:54 GMT   |   commented by: Kevin Beaver   |   Firewalls, Home networks, Ports

Which is more vulnerable among IBM, MS, Apple, Samsung?

last updated: 2013-11-26 18:57:05 GMT   |   commented by: Kevin Beaver   |   Apple, IBM, Microsoft, MS, samsung, Security, Vulnerability Assessment & Audit, vulnerability management

Hacking a hotmail account with URL

last updated: 2013-11-26 18:56:06 GMT   |   commented by: Kevin Beaver   |   Hotmail

Give away old tower

last updated: 2013-11-26 18:55:27 GMT   |   commented by: Kevin Beaver   |   GIVEAWAY, SAFETY, TOWER

which tools can be used to analyse vulnerabilities?

last updated: 2013-11-26 18:51:29 GMT   |   commented by: Kevin Beaver   |   help, Security, Security accessment, security tools, vulnerability, Vulnerability Assessment & Audit, vulnerability scanning

Encryption: Using a static IV

last updated: 2013-11-26 18:46:40 GMT   |   commented by: Kevin Beaver   |   Encryption, Static IV

Does SSL equal secure email through transit?

last updated: 2013-11-25 18:59:11 GMT   |   commented by: Kevin Beaver   |   Email security, SMTP, SSL


Badges Earned:
Gold
Silver
Bronze
Blogger
Experience by Topic
Database
[ rank ]
DataCenter
[ rank ]
Development
[ rank ]
Microsoft Exchange
[ rank ]
Microsoft Windows
[ rank ]
Mobile
[ rank ]
Networking
[ rank ]
Security
[ rank ]
Storage
[ rank ]
Virtualization
[ rank ]
VoIP
[ rank ]
Windows Server
[ rank ]

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: