94 Posts

David Strom

Security Evangelist

David is an award-winning writer, speaker, editor, video blogger, and online communications professional who also advises numerous startup and well-established technology ventures. He began his career as an in-house IT analyst and has founded numerous technology print and online publications, such as editor-in-chief of Network Computing magazine and as part of the launch team of PC Week's Connectivity section. David has written two books and spoken around the world at various conferences and been on national radio and television talking about network technologies. He continues to build websites and publish articles on a wide variety of technology topics geared towards networking, security, channel, PC enthusiasts, OEMs, and consumers. In addition to these activities, he consults to vendors and evaluates emerging technologies, products, strategies, and trends to help position and improve their technology products.

Written By David Strom

How to Defend Your Organization Against Fileless Malware Attacks

Fighting fileless malware attacks will take some serious effort and careful coordination among a variety of tools and techniques.

Is Your Site Protected Against Drupal Security Flaws?

This past summer saw a pair of Drupal security flaws exposed and patched. Is your website secure?

Space Rogue: A Security Rebel Turned Pen Tester

Two decades ago, Cris Thomas testified before Congress about various cybersecurity issues he uncovered as a white hat hacker. Today, he works as a penetration testing specialist for IBM X-Force Red.

Are Ransomware Attacks Rising or Falling?

There are conflicting reports over whether or not ransomware attacks are growing. Many organizations state that it's the most popular malware form, but is this true?

What Are the Legalities and Implications of ‘Hacking Back’?

The concept of "hacking back" opens up a wide range of cyber defense tools to IT and security managers. Lawmakers are interested in new rules that allow for more flexibility with these activities.

RSA Conference 2018 Recap: Building a Foundation for Tomorrow’s Cybersecurity

At the RSA Conference 2018, speakers touched on topics such as the IoT, blockchain and cryptography and stoked meaningful conversations about diversity and other pressing issues in cybersecurity.

How to Get the Most Out of the RSA Conference 2018

There's something for every cybersecurity enthusiast at this year's RSA Conference, including masterful keynotes, stirring panels and vendor showcases featuring the latest technologies in the field.

Understanding the Relationship Between AI and Cybersecurity

While some observers fear a Skynet-esque future of malicious, self-aware machines, Dudu Mimran envisions a world in which AI and cybersecurity work together to keep emerging threats in check.

An Interview With IBM Master Inventor James Kozloski on His New Security Patent: The Cognitive Honeypot

An innocent conversation with a colleague at the office printing station led IBM Master Inventor James Kozloski to land a security patent for the cognitive honeypot, a tool to combat spear phishing.

How to Improve Cyber Literacy Within Your Organization

The quest to promote cyber literacy is as old as the internet itself, but the increasing connectedness of the technology landscape is making it more important than ever.