• Boot camps & training
  • Awareness & anti-phishing
  • Community
    • Topics
    • Certification Prep
    • Cyber Work
    • About us
    • Back
    • Industry insights
    • Phishing
    • Hacking
    • Capture the flag (CTF)
    • Professional development
    • Security awareness
    • Penetration testing
    • Cyber ranges
    • General security
    • Management & compliance
    • Malware analysis
    • MITRE ATT&CK™
    • News
    • Application security
    • Digital forensics
    • View all
    • Back
    • Back
    • (ISC)² CISSP
    • (ISC)² CCSP
    • (ISC)² CAP
    • Cisco CCNA
    • CMMC
    • CompTIA A+
    • CompTIA Network+
    • CompTIA Security+
    • CompTIA CySA+
    • CompTIA PenTest+
    • CompTIA CASP+
    • EC-Council CEH
    • ISACA CDPSE
    • ISACA CGEIT
    • ISACA CISA
    • ISACA CISM
    • ISACA CRISC
    • Microsoft Azure
    • PMP
    • View all
    • Back
    • Cyber Work Podcast
    • Cyber Work Live
    • Back
    • Contact us
    • Contributors

Kevin Jones

Kevin has specialized in a variety of cybersecurity initiatives in the privileged management space. As Senior Security Architect for Thycotic, Kevin brings a deep understanding of cryptography and cryptographic systems as well as advanced threat modeling to the design and implementation of enterprise security software. A Microsoft MVP, Kevin has been a featured presenter at numerous IT and security events including IANS Forums, ISSA, ISACA and software development clinics.

Vulnerabilities January 22, 2015 Kevin Jones

POODLE: Not your typical walk in the park

Google, among several security organizations, recently announced a vulnerability in the SSL protocol, particularly SSL version 3. SSL is used to secure connections...
Hacking January 20, 2015 Kevin Jones

Privileged Account Management: Lessons from the Sony Hack

CNN recently reveled the methodology of the cyber attack that allowed anonymous cybercriminals Guardians of Peace direct access to their network, or the "keys...
Critical infrastructure October 16, 2014 Kevin Jones

Protecting the Smart Grid from Cyber Threats

In October 2008, an assassination attempt against exiled former Pakistani Prime Minister Benazir Bhutto was carried out by al-Qaeda operatives in the form of...
Infosec logo

Topics

Hacking Penetration testing Cyber ranges Capture the flag Malware analysis Professional development General security News Security awareness Phishing Management, compliance & auditing Digital forensics Threat intelligence DoD 8570 View all topics

Certifications

CISSP CCSP CGEIT CEH CCNA CISA CISM CRISC A+ Network+ Security+ CASP+ PMP CySA+ CMMC Microsoft Azure View all certifications

Careers

IT auditor Cybersecurity architect Cybercrime investigator Penetration tester Cybersecurity consultant Cybersecurity analyst Cybersecurity engineer Cybersecurity manager Incident responder Information security auditor Information security manager View all careers

Company

Contact us About Infosec Work at Infosec Newsroom Partner program
  • Infosec, part of Cengage Group — ©2023 Infosec Institute, Inc.
    • Trademarks
    • Privacy Policy