58 Posts

David Strom

Security Evangelist, IBM

David is an award-winning writer, speaker, editor, video blogger, and online communications professional who also advises numerous startup and well-established technology ventures. He began his career as an in-house IT analyst and has founded numerous technology print and online publications, such as editor-in-chief of Network Computing magazine and as part of the launch team of PC Week's Connectivity section. David has written two books and spoken around the world at various conferences and been on national radio and television talking about network technologies. He continues to build websites and publish articles on a wide variety of technology topics geared towards networking, security, channel, PC enthusiasts, OEMs, and consumers. In addition to these activities, he consults to vendors and evaluates emerging technologies, products, strategies, and trends to help position and improve their technology products.

Written By David Strom

The Coming Revolution of Voice Control With Artificial Intelligence

New capabilities such as artificial intelligence and voice control make it easier to interact with our devices, but they also introduce security concerns.

Time to Stop Shaming Phishing Victims

It is counterproductive to shame phishing victims because it discourages end users from alerting IT professionals of suspicious emails or activity.

Is it Time to Buy Cyber Insurance?

To limit the potentially debilitating financial impact of a security breach, many companies opt to take out cyber insurance policies.

A Progress Report on Cybersecurity in Israel

The CyberTech conference is a good introduction to cybersecurity in Israel, but the industry is booming throughout the country at an unprecedented rate.

Tracking the Digital Transition in the White House

As part of the digital transition in the White House, former President Barack Obama's social media records will be transferred to a separate archive.

How to Ensure the Success of a Hot Desking Strategy

A hot desking strategy allows employees to sit wherever they want, creating more flexibility for workers and more complexity for IT managers.

Protecting Your Staff in Co-Working Spaces

Co-working spaces can help companies maximize productivity, but they can also introduce security concerns if employees are not trained to connect securely.

First Day on the Job for a Typical CIO or CISO

When starting a new job, the CIO must become intimately knowledgeable about the data within his or her jurisdiction and develop strategies ahead of time.

Avoiding Threat Management Rookie Mistakes

Two recent cyberattacks against global companies and services demonstrated the need for better threat management practices and awareness.

Cybercriminals Are Getting Better at Using Advanced Authentication Methods

Cybercriminals are becoming more advanced and learning how to leverage the latest authentication methods to exploit security weaknesses.