Chad Kime Avatar
Lead Writer

Expertise

  • Identity management
  • Network security
  • Compliance
  • Products
  • Risk

Education

  • Master of Business Administration (MBA) from the University of Southern California (USC)
  • Bachelor of Science in Electrical Engineering from the University of California, Los Angeles (UCLA)
  • CompTIA Network+ Certification
  • How to Recover From a Ransomware Attack

    How to Recover From a Ransomware Attack

    Ransomware response and recovery can broken down into four steps: 1. Isolate, Assess, Call for Help: 2. Recover what can be recovered, replace what cannot be recovered. 3. Apply lessons-learned…

  • Cloud Security: The Shared Responsibility Model

    Cloud Security: The Shared Responsibility Model

    Cloud security builds off of the same IT infrastructure and security stack principles of a local data center. However, a cloud vendor offering provides a pre-packaged solution that absorbs some…

  • Okta ‘Breaches’ Weren’t Really Breaches

    Okta ‘Breaches’ Weren’t Really Breaches

    With two high-profile breaches this year, Okta, a leader in identity and access management (IAM), made the kind of headlines that security vendors would rather avoid. After seeing headlines like…

  • New SEC Cybersecurity Rules Could Affect Private Companies Too

    New SEC Cybersecurity Rules Could Affect Private Companies Too

    For years, the U.S. Securities and Exchange Commission (SEC) strongly advised public companies to improve their cybersecurity. However, after minimal corporate adoption of stronger cybersecurity, the SEC has drafted rules…

  • Security Data Lakes Emerge to Address SIEM Limitations

    Security Data Lakes Emerge to Address SIEM Limitations

    Every security team craves clear visibility into the endpoints, networks, containers, applications, and other resources of the organization. Tools such as endpoint detection and response (EDR) and extended detection and…

  • Security Considerations for Data Lakes

    Security Considerations for Data Lakes

    Many of the basic principles for securing a data lake will be familiar to anyone who has secured a cloud security storage container. Of course, since most commercial data lakes…

  • Best Zero Trust Security Solutions

    Best Zero Trust Security Solutions

    A presidential executive order mandating a zero trust strategy for federal agencies has raised the profile of the cybersecurity technology and prompted many non-government IT security managers to consider how…

  • IDS & IPS Remain Important Even as Other Tools Add IDPS Features

    IDS & IPS Remain Important Even as Other Tools Add IDPS Features

    Intrusion detection system (IDS) and intrusion prevention system (IPS) technologies – often combined as intrusion detection and prevention (IDPS) – have been in use for decades, yet they remain important…

  • Why You Need to Tune EDR to Secure Your Environment

    Why You Need to Tune EDR to Secure Your Environment

    Endpoint detection and response (EDR) solutions typically deploy in a standard configuration meant to deliver the least number of false positive alerts in a generic environment. This allows EDR to…

  • MFA Advantages and Weaknesses

    MFA Advantages and Weaknesses

    Not everyone adopts multi-factor authentication (MFA) to secure their accounts. Many stick with simple username and password combinations despite the weaknesses of this authentication method. Yet if someone wanted to…


Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies