Get a demo Acunetix Website Security Scanner Get a demo
  • Product
  • Why Acunetix?
    • Solutions
      • INDUSTRIES
        • IT & Telecom
        • Government
        • Financial Services
        • Education
        • Healthcare
      • ROLES
        • CTO & CISO
        • Engineering Manager
        • Security Engineer
        • DevSecOps
    • Case Studies
    • Customers
    • Testimonials
  • Pricing
  • About Us
    • Our story
    • In the news
    • Careers
    • Contact
  • Resources
    • Blog
    • Webinars
    • White papers
    • Buyer’s guide
    • Partners
    • Support
  • Get a demo

Author Archives Kevin Beaver

THE AUTHOR
Kevin Beaver

LinkedIn
Kevin Beaver, CISSP is an independent information security consultant, writer, and professional speaker with Atlanta, GA-based Principle Logic, LLC. With over 32 years in IT and 26 years in security, Kevin specializes in vulnerability and penetration testing, security program reviews, and virtual CISO consulting work to help businesses uncheck the boxes that keep creating a false sense of security.

Balancing web security with your compliance requirements

Web Security Zone | September 1, 2014 by Kevin Beaver

As an executive responsible for many aspects of running your business, it can be difficult and downright confusing trying to understand the balance between Web security and compliance. Your IT, information security, and internal audit teams may be telling you completely different things based on…

Read more

Common network security assessment oversights

Web Security Zone | July 28, 2014 by Kevin Beaver

Network security assessments are one of the most critical exercises performed for minimizing business risks. Your time is limited. You’ve got pressure from management to get things done. There’s so much to do and not enough time to do it. Yet, network security assessments are…

Read more

Making web security part of your IT governance program

Web Security Zone | July 23, 2014 by Kevin Beaver

Moving past IT compliance, IT “governance” is becoming the new area of focus in enterprises today. With compliance often being a more tactical business function, IT governance tends to operate at a higher level, especially in larger organizations. Internal audit, legal, and boards of directors…

Read more

Taking your network security assessment to the next level

Web Security Zone | July 21, 2014 by Kevin Beaver

There’s always a point in every IT professional’s career where he thinks he has everything figured out. We can get so caught up in our ways that we often overlook the fact that there are so many things we do on a daily basis that…

Read more

Top network security flaws you’re likely overlooking

Web Security Zone | July 16, 2014 by Kevin Beaver

There’s no doubt you know your network better than anyone else. The real question is, do you know whether you’ve checked for all relevant security flaws on all of your critical systems? Odds are you haven’t but that’s okay to an extent. No one has…

Read more

What you need to know about performing authenticated network security scans

Web Security Zone | July 14, 2014 by Kevin Beaver

Are you scanning your network hosts for security vulnerabilities while logged in as a user? If not, you should be. Authenticated testing can add a lot of value to your overall security assessment results. You’ll find a lot more missing patches, weak share permissions, and…

Read more

Network vulnerability assessment gotchas to avoid

Web Security Zone | June 25, 2014 by Kevin Beaver

There’s a saying that experience is something you don’t get until just after you need it. It’s so true, especially in the context of information security and, specifically, network security testing. If you have any experience running vulnerability scans, you’ve no doubt been down that…

Read more

Five Web Security Issues Present in Your Business Today

Web Security Zone | June 9, 2014 by Kevin Beaver

Web security is very complex – with a lot of unknowns. As an executive running a business with a lot of moving parts, I’m sure you can relate. There are numerous areas – both operational and technical – where web security is lacking in practically…

Read more

Getting Back to Basics with Web Security

Web Security Zone | June 2, 2014 by Kevin Beaver

It’s usually the simple things in life that create the most problems – we’ve all learned this universal law the hard way. Be it slick tires when driving in the rain, that extra decimal point when doing our taxes, or a bad Ethernet patch cable…

Read more

  • 1
  • 2
  • 3
  • 4
  • …
  • 12
  • 2 / 12
Subscribe by Email

Get the latest content on web security in your inbox each week.

We respect your privacy

Learn More
  • IIS Security
  • Apache Troubleshooting
  • Security Scanner
  • DAST vs SAST
  • Threats, Vulnerabilities, & Risks
  • Vulnerability Assessment vs Pen Testing
  • Server Security
  • Google Hacking
Blog Categories
  • Articles
  • Web Security Zone
  • News
  • Events
  • Product Releases
  • Product Articles

Take action and discover your vulnerabilities

Get a demo
Product Information
  • AcuSensor Technology
  • AcuMonitor Technology
  • Acunetix Integrations
  • Vulnerability Scanner
  • Support Plans
Use Cases
  • Penetration Testing Software
  • Website Security Scanner
  • External Vulnerability Scanner
  • Web Application Security
  • Vulnerability Management Software
Website Security
  • Cross-site Scripting
  • SQL Injection
  • Reflected XSS
  • CSRF Attacks
  • Directory Traversal
Learn More
  • White Papers
  • TLS Security
  • WordPress Security
  • Web Service Security
  • Prevent SQL Injection
Company
  • About Us
  • Customers
  • Become a Partner
  • Careers
  • Contact
Documentation
  • Case Studies
  • Support
  • Videos
  • Vulnerability Index
  • Webinars
  • Login
  • Invicti Subscription Services Agreement
  • Privacy Policy
  • Terms of Use
  • Sitemap
  • Find us on Facebook
  • Follow us on Twiter
  • Follow us on LinkedIn

© Acunetix 2023, by Invicti