82 Posts

David Strom

Security Evangelist

David is an award-winning writer, speaker, editor, video blogger, and online communications professional who also advises numerous startup and well-established technology ventures. He began his career as an in-house IT analyst and has founded numerous technology print and online publications, such as editor-in-chief of Network Computing magazine and as part of the launch team of PC Week's Connectivity section. David has written two books and spoken around the world at various conferences and been on national radio and television talking about network technologies. He continues to build websites and publish articles on a wide variety of technology topics geared towards networking, security, channel, PC enthusiasts, OEMs, and consumers. In addition to these activities, he consults to vendors and evaluates emerging technologies, products, strategies, and trends to help position and improve their technology products.

Written By David Strom

The Benefits of Operational Risk Management

Operational risk management can help organizations measure the cost of network security solutions versus the cost of a potential data breach.

The History and Reinvention of NAC

Network access control (NAC) and enterprise networks themselves have come a long way in the past decade.

How Israel Became the Land of Connected Car Research and Development

With its many manufacturer-sponsored test labs, smart car startups and military imperatives, Israel is becoming a major hub for connected car research.

Why I Became an E-Resident of Estonia

Estonia is leading the way in digital innovation, providing smart ID cards to its citizens to vote and interact with other public services.

How Are ATMs Exploited? An Update on ATM Malware Methods

ATM malware has evolved significantly in three years.

How to Increase Transparency and Rebuild Trust After a Data Breach

In the wake of a data breach, organizations should strive to be as transparent and responsive as possible to rebuild customer trust.

Money Talks: Speaking the Language of Money to Boost Security Awareness Among CEOs

CEOs often lack security awareness because IT professionals fail to communicate risks in the context of the organization's bottom line.

Across the Great Divide: Measuring Security Awareness Among US and UK Users

A survey revealed that while security awareness differs among users in the U.S. and U.K. in a variety of areas, both populations have a long way to go.

Estonia to Build Off-Site Data Center in Luxembourg

Pending negotiations with Luxembourg, Estonia will become the first nation to build an off-site data center in another country.

The Limits of Linguistic Analysis for Security Attribution

Linguistic analysis can provide clues to help security analysts trace the source of a cyberattack, but the method is inconclusive on its own.