76 Posts

David Strom

Security Evangelist

David is an award-winning writer, speaker, editor, video blogger, and online communications professional who also advises numerous startup and well-established technology ventures. He began his career as an in-house IT analyst and has founded numerous technology print and online publications, such as editor-in-chief of Network Computing magazine and as part of the launch team of PC Week's Connectivity section. David has written two books and spoken around the world at various conferences and been on national radio and television talking about network technologies. He continues to build websites and publish articles on a wide variety of technology topics geared towards networking, security, channel, PC enthusiasts, OEMs, and consumers. In addition to these activities, he consults to vendors and evaluates emerging technologies, products, strategies, and trends to help position and improve their technology products.

Written By David Strom

How to Become a Successful CISO

A career as a CISO can be highly rewarding, but it's not all glitz and glamor. Security leaders must be tactful, strategic and communicative to succeed.

How to Hire Your Next CISO

Hiring a CISO is more about finding gaps, committing to new ideas and bringing those ideas to life than it is about finding the right person for the job.

It Is Time to Get Serious About Security Theater

Sometimes, the value of peace of mind outweighs the cost of solutions that merely create an illusion of security, also known as security theater.

Do Threat Intelligence Exchanges Really Work?

Threat intelligence exchanges enable companies to detect and respond to incidents more effectively, but only if they take the necessary steps to prepare.

How Should You Communicate With Your Senior Management Team?

IT professionals must consider the motivations and concerns of senior management when communicating about security issues and refrain from using jargon.

Why Blockchain-as-a-Service Should Be on Your Radar

Blockchain-as-a-service could be the next big thing to hit enterprises. Learn about the best options and processes for getting started with this tech.

Making the Move to an All-HTTPS Network

There are countless benefits to moving web infrastructure to support the HTTPS protocol, but it's not as simple as swapping one protocol for another.

Time to End the Tension Between Corporate Remediation and Security Teams

Although remediation and security teams are working toward a common goal, their conflicting priorities, culture and tools often lead to discord.

The Coming Revolution of Voice Control With Artificial Intelligence

New capabilities such as artificial intelligence and voice control make it easier to interact with our devices, but they also introduce security concerns.

Time to Stop Shaming Phishing Victims

It is counterproductive to shame phishing victims because it discourages end users from alerting IT professionals of suspicious emails or activity.