Tom Olzak

Tom Olzak

Cybersecurity Researcher, Author & Educator

Independent security researcher and an IT professional since 1983, with experience in programming, network engineering, and security. I have an MBA as well as CISSP certification. I am also an online instructor for the University of Phoenix. I've held positions as an IS director, director of infrastructure engineering, director of information security, and programming manager at a variety of manufacturing, healthcare, and distribution companies. Before joining the private sector, I served 10 years in the United States Army Military Police with four years as a military police investigator. I've written four books, Just Enough Security, Microsoft Virtualization, Enterprise Security: A Practitioner's Guide, and Incident Management and Response Guide. I am also the author of various papers and articles on security management.
Stories by Tom Olzak
Ransomware payments have become a much-debated topic in the corporate world. Read more about whether working with cyber insurers is...
Read more to understand why adaptive authentication is a critical component of a Zero Trust Network (ZTN) and how it...
In the first two articles in this three-part series, I described the three system security engineering contexts problem, solution, and...
Part 2In the first article in this series, I explained the need for system security engineering and how it works....
Knowing what personal information about employees and customers is available to potential attackers helps organizations determine the risk associated with...
Security professionals continue to improve their organization's defenses, causing malicious actors (MAs) to find ways to circumvent controls. One way...