Tom Olzak

Tom Olzak

Cybersecurity Researcher, Author & Educator

Independent security researcher and an IT professional since 1983, with experience in programming, network engineering, and security. I have an MBA as well as CISSP certification. I am also an online instructor for the University of Phoenix. I've held positions as an IS director, director of infrastructure engineering, director of information security, and programming manager at a variety of manufacturing, healthcare, and distribution companies. Before joining the private sector, I served 10 years in the United States Army Military Police with four years as a military police investigator. I've written four books, Just Enough Security, Microsoft Virtualization, Enterprise Security: A Practitioner's Guide, and Incident Management and Response Guide. I am also the author of various papers and articles on security management.
Stories by Tom Olzak
Privileged accounts need stringent administration and activity monitoring to prevent unauthorized access to sensitive data. Let’s learn more about PAM...
By fusing several processes, merging installation and modifications, and verifying the functioning of systems, ITAM ensures effective management of all...
The data security lifecycle helps IT teams comprehend which systems and data need protection and how information flows from the...
Companies must use a verified OT security model to assess the threats like Industroyer in their present OT settings. Learn...
With the use of homomorphic encryption, data that has been encrypted can be altered or studied privately. Learn more about...
Machine Learning offers many benefits to companies, but can also enhance threat actors’ attacking prowess. Here’s a lowdown on ML-enabled...