Tom Olzak

Tom Olzak

Cybersecurity Researcher, Author & Educator

Independent security researcher and an IT professional since 1983, with experience in programming, network engineering, and security. I have an MBA as well as CISSP certification. I am also an online instructor for the University of Phoenix. I've held positions as an IS director, director of infrastructure engineering, director of information security, and programming manager at a variety of manufacturing, healthcare, and distribution companies. Before joining the private sector, I served 10 years in the United States Army Military Police with four years as a military police investigator. I've written four books, Just Enough Security, Microsoft Virtualization, Enterprise Security: A Practitioner's Guide, and Incident Management and Response Guide. I am also the author of various papers and articles on security management.
Stories by Tom Olzak
Here’s a quick handbook to understand the traditional backup challenges and how CDP (continuous data protection) can palliate the issues...
Misuse case diagrams, unlike use case diagrams, help organizations prevent threat actors from making changes in a system. In this...
Any time backups are easily seen by threat actors, there is a higher than acceptable risk that backups will be...
APIs are a continually expanding attack surface that is often overlooked due to a lack of understanding. Here’s a look...
In a security landscape flooded by acronyms, abbreviations, and labels, another has emerged: the cybersecurity mesh. By definition, it is...
With the right set of security practices and tools, organizations can manage security issues associated with shadow IT. Let’s see...