Chad Kime Avatar
Lead Writer

Expertise

  • Identity management
  • Network security
  • Compliance
  • Products
  • Risk

Education

  • Bachelor of Science in Electrical Engineering from the University of California, Los Angeles (UCLA)
  • Master of Business Administration (MBA) from the University of Southern California (USC)
  • CompTIA Network+ Certification
  • Security Considerations for Data Lakes

    Security Considerations for Data Lakes

    Many of the basic principles for securing a data lake will be familiar to anyone who has secured a cloud security storage container. Of course, since most commercial data lakes…

  • Best Zero Trust Security Solutions

    Best Zero Trust Security Solutions

    A presidential executive order mandating a zero trust strategy for federal agencies has raised the profile of the cybersecurity technology and prompted many non-government IT security managers to consider how…

  • Zero Trust: Hype vs. Reality

    Zero Trust: Hype vs. Reality

    Just as the development of cannons and other weapons made walls obsolete as a form of defense, sophisticated cyber attacks have made the firewall-perimeter model of cybersecurity equally obsolete. No…

  • IDS & IPS Remain Important Even as Other Tools Add IDPS Features

    IDS & IPS Remain Important Even as Other Tools Add IDPS Features

    Intrusion detection system (IDS) and intrusion prevention system (IPS) technologies – often combined as intrusion detection and prevention (IDPS) – have been in use for decades, yet they remain important…

  • Why You Need to Tune EDR to Secure Your Environment

    Why You Need to Tune EDR to Secure Your Environment

    Endpoint detection and response (EDR) solutions typically deploy in a standard configuration meant to deliver the least number of false positive alerts in a generic environment. This allows EDR to…

  • MFA Advantages and Weaknesses

    MFA Advantages and Weaknesses

    Not everyone adopts multi-factor authentication (MFA) to secure their accounts. Many stick with simple username and password combinations despite the weaknesses of this authentication method. Yet if someone wanted to…

  • APT Attacks & Prevention

    APT Attacks & Prevention

    A company that discovers that an advanced persistent threat (APT) attack is underway tends to be the exception. Attackers design APTs to be subtle, persistent, and to remain undetected for…

  • Data Deletion Methods: What’s Best for Sensitive Data?

    Data Deletion Methods: What’s Best for Sensitive Data?

    Users may believe that when they delete a file on their hard drive, the document no longer exists. However, IT professionals understand that the data itself may remain. Yet even…

  • Three Ways to Protect Unfixable Security Risks

    Three Ways to Protect Unfixable Security Risks

    How can a hospital protect an MRI machine with an unchangeable password and still connect it to the network? How can an industrial recycler safely secure its $400,000 hard drive…

  • Hiding Devices Using Port Knocking or Single-Packet Authorization (SPA)

    Hiding Devices Using Port Knocking or Single-Packet Authorization (SPA)

    Invisibility sounds like something out of a fantasy novel, but if done properly, we can use it to hide computers, gateways, or individual PCs by implementing specific firewall techniques like port…


Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies