Kim Crawley

Kim Crawley

Guest Blogger

Kim Crawley spent years working in general tier two consumer tech support, most of which as a representative of Windstream, a secondary American ISP. Malware related tickets intrigued her, and her knowledge grew from fixing malware problems on thousands of client PCs. Her curiosity led her to research malware as a hobby, which grew into an interest in all things information security related.

By 2011, she was already ghostwriting study material for the InfoSec Institute’s CISSP and CEH certification exam preparation programs. Ever since, she’s contributed articles on a variety of information security topics to CIO, CSO, Computerworld, SC Magazine, and 2600 Magazine.

Her first solo developed PC game, Hackers Versus Banksters, had a successful Kickstarter and was featured at the Toronto Comic Arts Festival in May 2016. This October, she gave her first talk at an infosec convention, a penetration testing presentation at BSides Toronto.

She considers her sociological and psychological perspective on infosec to be her trademark. Given the rapid growth of social engineering vulnerabilities, always considering the human element is vital.

Posts by Kim Crawley

How SSH works: Secure Shell explained

May 21, 2020   |   Kim Crawley

Web application firewalls explained: what is WAF?

May 6, 2020   |   Kim Crawley

Cybersecurity budgets explained: how much do companies spend on cybersecurity?

May 5, 2020   |   Kim Crawley

Have you started working from home? Secure your endpoints!

Apr 29, 2020   |   Kim Crawley

Deep web criminal activity and dark web news: prevention strategies explained

Apr 24, 2020   |   Kim Crawley

Can incident response be fun?

Apr 14, 2020   |   Kim Crawley

What is cloud asset management?

Mar 26, 2020   |   Kim Crawley

Insider attacks and insider threats in cyber security explained

Mar 19, 2020   |   Kim Crawley

How honeypot works: reviewing honeypot security traps

Mar 3, 2020   |   Kim Crawley