Tom Olzak

Tom Olzak

Cybersecurity Researcher, Author & Educator

Independent security researcher and an IT professional since 1983, with experience in programming, network engineering, and security. I have an MBA as well as CISSP certification. I am also an online instructor for the University of Phoenix. I've held positions as an IS director, director of infrastructure engineering, director of information security, and programming manager at a variety of manufacturing, healthcare, and distribution companies. Before joining the private sector, I served 10 years in the United States Army Military Police with four years as a military police investigator. I've written four books, Just Enough Security, Microsoft Virtualization, Enterprise Security: A Practitioner's Guide, and Incident Management and Response Guide. I am also the author of various papers and articles on security management.
Stories by Tom Olzak
Hackers have learned that transnational attacks - attacks on victims outside their national borders - are low risk and high...
The proliferation of endpoint devices, coupled with the scale of remote work, has complicated endpoint security. Organizations can streamline endpoint...
Threat hunting is a structured approach that uses tools and techniques that dig deep into your environment. It does not...
CLDAP is often exposed to the internet without its administrators' knowledge, enabling hackers to exploit its amplification factor to launch...
The Deadbolt ransomware was used by hackers to exploit vulnerabilities in NAS devices and hold organizations to ransom. Here’s how...
Biometrics plays a crucial role in identity and access management. This article explores this authentication method in great detail, why...