Chad Kime Avatar
Lead Writer

Expertise

  • Identity management
  • Network security
  • Compliance
  • Products
  • Risk

Education

  • Master of Business Administration (MBA) from the University of Southern California (USC)
  • Bachelor of Science in Electrical Engineering from the University of California, Los Angeles (UCLA)
  • CompTIA Network+ Certification
  • Complete Guide to the Types of DDoS Attacks

    Complete Guide to the Types of DDoS Attacks

    Distributed denial-of-service (DDoS) attacks occur when attackers use a large number of devices to attempt to overwhelm a resource and deny access to that resource for legitimate use. Most commonly,…

  • Vulnerability Patching: How to Prioritize and Apply Patches

    Vulnerability Patching: How to Prioritize and Apply Patches

    Every IT environment and cybersecurity strategy has vulnerabilities. To avoid damage or loss, organizations need to find and eliminate those vulnerabilities before attackers can exploit them. Some of those vulnerabilities…

  • Sample Patch Management Policy Template

    How to use this template: Comments intended to guide understanding and use of this patch management policy template will be enclosed in brackets “[…]” and the ‘company’ will be listed…

  • How to Recover From a Ransomware Attack

    How to Recover From a Ransomware Attack

    Ransomware response and recovery can broken down into four steps: 1. Isolate, Assess, Call for Help: 2. Recover what can be recovered, replace what cannot be recovered. 3. Apply lessons-learned…

  • Cloud Security: The Shared Responsibility Model

    Cloud Security: The Shared Responsibility Model

    Cloud security builds off of the same IT infrastructure and security stack principles of a local data center. However, a cloud vendor offering provides a pre-packaged solution that absorbs some…

  • Okta ‘Breaches’ Weren’t Really Breaches

    Okta ‘Breaches’ Weren’t Really Breaches

    With two high-profile breaches this year, Okta, a leader in identity and access management (IAM), made the kind of headlines that security vendors would rather avoid. After seeing headlines like…

  • New SEC Cybersecurity Rules Could Affect Private Companies Too

    New SEC Cybersecurity Rules Could Affect Private Companies Too

    For years, the U.S. Securities and Exchange Commission (SEC) strongly advised public companies to improve their cybersecurity. However, after minimal corporate adoption of stronger cybersecurity, the SEC has drafted rules…

  • Security Data Lakes Emerge to Address SIEM Limitations

    Security Data Lakes Emerge to Address SIEM Limitations

    Every security team craves clear visibility into the endpoints, networks, containers, applications, and other resources of the organization. Tools such as endpoint detection and response (EDR) and extended detection and…

  • Security Considerations for Data Lakes

    Security Considerations for Data Lakes

    Many of the basic principles for securing a data lake will be familiar to anyone who has secured a cloud security storage container. Of course, since most commercial data lakes…

  • Best Zero Trust Security Solutions

    Best Zero Trust Security Solutions

    A presidential executive order mandating a zero trust strategy for federal agencies has raised the profile of the cybersecurity technology and prompted many non-government IT security managers to consider how…


Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies