Kevin Beaver Principle Logic, LLC blog Search Security Incorporating static source code analysis into security testing 28 Jun 2017 Search Security Information privacy and security requires a balancing act 15 Jun 2017 Search Enterprise Desktop Windows 10 security tools to have handy 13 Jun 2017 Search Security To secure Office 365, take advantage of controls Microsoft offers 12 Jun 2017 Search Security Office 365 security features: As good as it gets? 12 Jun 2017 Search Security Address Office 365 security concerns while enjoying its benefits 12 Jun 2017 Search Security What the end of hot patching mobile apps means for enterprise security 17 May 2017 Search Security How to identify and address overlooked web security vulnerabilities 09 May 2017 Search Security DLP systems: Spotting weaknesses and improving management 30 Mar 2017 Search Security Android VPN apps: How to address privacy and security issues 28 Mar 2017 Search Security Preventing DoS attacks: The best ways to defend the enterprise 31 Jan 2017 Search Security Monitoring outbound traffic on your network: What to look for 24 Jan 2017 Search Security Best practices for an information security assessment 12 Jul 2016 Search Enterprise Desktop Windows POSReady 2009 registry hack brings back Windows XP updates 27 Jun 2016 Search Security What enterprises need to know about Internet traffic blocking 07 Mar 2016 Search Security Should the Netdump flaw deter enterprise ODL SDN use? 09 Sep 2015 Search Enterprise Desktop Why you should remove local administrator rights once and for all 23 Jul 2015 Search Security State of the Network study: How security tasks are dominating IT staff 19 Jun 2015 Search Security The secrets of proper firewall maintenance and security testing techniques 06 Apr 2015 Search Security What are the secrets to SIEM deployment success? 25 Mar 2015 SearchWindows Server IIS exploits in Windows Server and how you can fix them 24 Feb 2015 Search Security Benefits of the Cisco OpenSOC security analytics framework 17 Feb 2015 Search Security How emerging threat intelligence tools affect network security 02 Feb 2015 Search Enterprise Desktop Tighten Windows 8.1 security in five simple steps 28 Jan 2015 Search Security Lessons learned: Network security implications of Shellshock 13 Jan 2015 SearchWindows Server Hidden vulnerabilities on your IIS 8 servers 31 Oct 2014 Search Security Authenticated vulnerability scanning: How much do you know? 19 Aug 2014 Search Security Big data security analytics: Facebook's ThreatData framework 22 Jul 2014 Search Software Quality Proactive additions shore up forms-based authentication 17 Jun 2014 Search Enterprise Desktop Before you clone HDD to SSD, know the benefits and danger to data 30 Dec 2013 Search Enterprise Desktop Locking down Internet Explorer settings with Group Policy in IE 11 11 Dec 2013 Search Enterprise Desktop Windows Server Update Services weaknesses you may not know about 22 Jan 2013 Search Enterprise Desktop Microsoft Office 2013 crackable, so look to Office password recovery 07 Jan 2013 SearchWindows Server How vulnerable is Microsoft IIS 7.5 to attacks? 09 Dec 2010 Search Data Center Common security flaws to check for on your Linux-based Web systems 31 Mar 2010 Search Software Quality Why use POST vs. GET to keep applications secure 09 Feb 2010 Search Enterprise Desktop Securing removable drives with BitLocker To Go 27 Jan 2010 Search Security Lack of incident response plan leaves hole in compliance strategy 22 Jan 2010 Search Enterprise Desktop Using BitLocker in Windows 7 01 Dec 2009 Search Disaster Recovery What's the difference between a disaster recovery plan and a business continuity plan? 02 Nov 2009 Search CIO Why it may not be ideal for your lawyer to be your compliance officer 19 May 2009 Search Enterprise Desktop Using Sysinternals tools in security management scenarios 18 Feb 2009 Search Enterprise Desktop Sysinternals tools: A must-have for every Windows security toolbox 06 Feb 2009 Search Software Quality Web application security testing checklist 03 Feb 2009 Search Enterprise Desktop The 10 most common Windows security vulnerabilities 24 Sep 2008 Search Enterprise Desktop Metasploit 3.1 updates improve Windows penetration testing 18 Mar 2008 Search Security Ten hacker tricks to exploit SQL Server systems 17 Jan 2008 Search Software Quality Cracking passwords the Web application way 17 Dec 2007 Search Enterprise Desktop Find Windows vulnerabilities with a hex editor 18 Sep 2007 Search Software Quality What to look for in a Web application security testing tool 23 Jun 2007 ComputerWeekly.com Wireless network security testing 30 Oct 2006 ComputerWeekly.com BackTrack: The gotta-have, free, network security tool you've never heard of 29 Aug 2006 Search Networking Run your VoIP calls over a VPN for enhanced security 10 Aug 2004 1 2