Kim Crawley

Kim Crawley

Guest Blogger

Kim Crawley spent years working in general tier two consumer tech support, most of which as a representative of Windstream, a secondary American ISP. Malware related tickets intrigued her, and her knowledge grew from fixing malware problems on thousands of client PCs. Her curiosity led her to research malware as a hobby, which grew into an interest in all things information security related.

By 2011, she was already ghostwriting study material for the InfoSec Institute’s CISSP and CEH certification exam preparation programs. Ever since, she’s contributed articles on a variety of information security topics to CIO, CSO, Computerworld, SC Magazine, and 2600 Magazine.

Her first solo developed PC game, Hackers Versus Banksters, had a successful Kickstarter and was featured at the Toronto Comic Arts Festival in May 2016. This October, she gave her first talk at an infosec convention, a penetration testing presentation at BSides Toronto.

She considers her sociological and psychological perspective on infosec to be her trademark. Given the rapid growth of social engineering vulnerabilities, always considering the human element is vital.

Posts by Kim Crawley

Explain Biometric Authentication

May 7, 2018   |   Kim Crawley

How SIEM Correlation Rules Work

Feb 20, 2018   |   Kim Crawley

SharePoint Security Best Practices

Jan 22, 2018   |   Kim Crawley

In Honor of Computer Security Day, Let’s Celebrate the Evolution of SIEM!

Nov 30, 2017   |   Kim Crawley

One Man Cyber Attacked 4,000 Companies; Don’t Let It Happen to You

Aug 29, 2017   |   Kim Crawley

Security Tips for Parents with Kids Going Back to School

Aug 14, 2017   |   Kim Crawley

Attackers Shifting to CNP Exploits as EMV is Implemented for Credit Cards

Apr 4, 2017   |   Kim Crawley

Are Windows Registry Fixers Safe?

Feb 15, 2017   |   Kim Crawley

UX Design: An Overlooked Aspect of Endpoint Security

Jan 4, 2017   |   Kim Crawley