Kevin Poniatowski

Kevin Poniatowski
Kevin brings an optimal blend of speaking ability, technical savvy, and an insatiable passion for security to Security Innovation's training customers. This produces an engaging and enlightening environment from which to deliver both technical and awareness courses. Kevin entered the application security field in 2007 with Security Innovation, where he has split time between application security course development and delivering instructor-led courses. Kevin is a Senior Security Instructor and Engineer at Security Innovation.

Recent Posts

Unfortunately, one of the many concerns keeping IT and Security management up at night is wondering how a disgruntled system administrator (either current or former) may act maliciously. For Administrators to be able to...

Fifty years ago, high atop Launch Complex 34 at Cape Canaveral, a spark caused by faulty wiring ignited flammable materials in the pure oxygen environment inside the Apollo 1 capsule during a "plugs out" test. Astronauts...

Ransomware first appeared as a method of stealing money from individuals, but it is now being used to restrict access to organizations such as hospitals, financial organizations, and even local law enforcement. Over the...

Passwords are a necessity for everyone. If your device isn’t password protected, then it’s not secure. With many people now using devices for both the home and the office, the risk of a security breach now doubles. You...

One of the common complaints I hear about application security professionals is that the supply of these engineers is not meeting the demand. As sensitive data breaches are becoming more common, the need for a skilled and...

Swift: Pros and Cons

by Kevin Poniatowski on June 9, 2014 at 9:31 AM

Examining the benefits and drawbacks of Apple's latest programming language, Swift.

Last week brought us a new programming language created by Apple called Swift. ...Many iOS developers were performing somersaults and...

Addressing Application Security Training Issues

How many 3rd party components, frameworks, and libraries are present within your organization’s infrastructure?  

This can be a tough question to answer, but it’s an important...

Developers need to be trained in secure coding techniques

The national nightmare created by the troubles with healthcare.gov has been bouncing around the airwaves and creating a thunderstorm of political outrage. But, in...

PCI 3.0 Motivates Organizations to Train Developers to Write more Secure Code

...Application Security Professionals Rejoice! As we charge into another holiday season here in the States, the most recent version of the Payment...

A Look at Today's Cyber Security Threats

by Kevin Poniatowski on November 27, 2013 at 2:38 PM

Understanding the link between information security awareness training & today's cyber environment

The strength of being human is our ability as a species to adapt to our environment.  Over the course of a lifetime, we...