74 Posts

David Strom

Security Evangelist

David is an award-winning writer, speaker, editor, video blogger, and online communications professional who also advises numerous startup and well-established technology ventures. He began his career as an in-house IT analyst and has founded numerous technology print and online publications, such as editor-in-chief of Network Computing magazine and as part of the launch team of PC Week's Connectivity section. David has written two books and spoken around the world at various conferences and been on national radio and television talking about network technologies. He continues to build websites and publish articles on a wide variety of technology topics geared towards networking, security, channel, PC enthusiasts, OEMs, and consumers. In addition to these activities, he consults to vendors and evaluates emerging technologies, products, strategies, and trends to help position and improve their technology products.

Written By David Strom

Tracking the Digital Transition in the White House

As part of the digital transition in the White House, former President Barack Obama's social media records will be transferred to a separate archive.

How to Ensure the Success of a Hot Desking Strategy

A hot desking strategy allows employees to sit wherever they want, creating more flexibility for workers and more complexity for IT managers.

Protecting Your Staff in Co-Working Spaces

Co-working spaces can help companies maximize productivity, but they can also introduce security concerns if employees are not trained to connect securely.

First Day on the Job for a Typical CIO or CISO

When starting a new job, the CIO must become intimately knowledgeable about the data within his or her jurisdiction and develop strategies ahead of time.

Avoiding Threat Management Rookie Mistakes

Two recent cyberattacks against global companies and services demonstrated the need for better threat management practices and awareness.

Cybercriminals Are Getting Better at Using Advanced Authentication Methods

Cybercriminals are becoming more advanced and learning how to leverage the latest authentication methods to exploit security weaknesses.

The Rise of the Cashless Society

As cryptocurrencies gain traction with banks and consumers, IT professionals must consider the cybersecurity implications of becoming a cashless society.

New Security Enhancements for Microsoft Windows Server 2016

Windows Server 2016 includes enhanced security features, such as VM encryption capabilities and a minimal Nano Server to reduce the attack surface.

Global City CIOs Launch New Organization to Promote Best Smart City Practices

A group of IT leaders from around the world formed the Council of Global City CIOs to promote information sharing when it comes to smart city initiatives.

UK Universities Make Rich Targets for Ransomware Attacks

Almost two-thirds of British universities fell victim to ransomware attacks in the past year, and the trend shows no signs of slowing down.