I'm a writer and content developer.

I write articles about Windows, IT security, certifications and the like, and develop online and on-ground courses.

  • 91
  • 74K
stories for
Kim Lindros's stories for
Show all
Security article 014 article

Insider threat detection tools that sniff out dangers from within

Learn about the insider threat detection tools that can zero-in on anomalous user behavior. Malicious or accidental, the insider threat is one of the most dangerous and costly to companies.

Search security article

How to craft an effective DevSecOps process with your team

Switching to a DevSecOps model in software development offers many benefits, but combining security and DevOps takes knowledge, forethought and planning.

Techtarget security article

Introduction to vulnerability management tools

Organizations today, from small businesses with Web and email access to multisite global enterprises, face increasingly sophisticated attacks carried out over the Internet.

Techtarget security article

The business case for vulnerability management tools

IT vulnerabilities can affect any organization of any size, in any industry across the world.

Techtarget security article

Seven criteria for buying vulnerability management tools

Vulnerability management tools use scanners to discover and identify network-attached computers, firewalls and other devices -- as well as operating systems and applications -- and assess those entities for vulnerabilities.

Techtarget security article

Comparing the top vulnerability management tools

Vulnerability management tools include the ability to detect and identify assets in an IT infrastructure, detect vulnerabilities, provide descriptions of vulnerabilities . . .


SearchSecurity.com's IT security certifications guide

Afraid of making a wrong turn in your career? Our 2015 guide to information security certifications maps out all your options.