93 Posts

David Strom

Security Evangelist

David is an award-winning writer, speaker, editor, video blogger, and online communications professional who also advises numerous startup and well-established technology ventures. He began his career as an in-house IT analyst and has founded numerous technology print and online publications, such as editor-in-chief of Network Computing magazine and as part of the launch team of PC Week's Connectivity section. David has written two books and spoken around the world at various conferences and been on national radio and television talking about network technologies. He continues to build websites and publish articles on a wide variety of technology topics geared towards networking, security, channel, PC enthusiasts, OEMs, and consumers. In addition to these activities, he consults to vendors and evaluates emerging technologies, products, strategies, and trends to help position and improve their technology products.

Written By David Strom

Do Threat Intelligence Exchanges Really Work?

Threat intelligence exchanges enable companies to detect and respond to incidents more effectively, but only if they take the necessary steps to prepare.

How Should You Communicate With Your Senior Management Team?

IT professionals must consider the motivations and concerns of senior management when communicating about security issues and refrain from using jargon.

Why Blockchain-as-a-Service Should Be on Your Radar

Blockchain-as-a-service could be the next big thing to hit enterprises. Learn about the best options and processes for getting started with this tech.

Making the Move to an All-HTTPS Network

There are countless benefits to moving web infrastructure to support the HTTPS protocol, but it's not as simple as swapping one protocol for another.

Time to End the Tension Between Corporate Remediation and Security Teams

Although remediation and security teams are working toward a common goal, their conflicting priorities, culture and tools often lead to discord.

The Coming Revolution of Voice Control With Artificial Intelligence

New capabilities such as artificial intelligence and voice control make it easier to interact with our devices, but they also introduce security concerns.

Time to Stop Shaming Phishing Victims

It is counterproductive to shame phishing victims because it discourages end users from alerting IT professionals of suspicious emails or activity.

Is it Time to Buy Cyber Insurance?

To limit the potentially debilitating financial impact of a security breach, many companies opt to take out cyber insurance policies.

A Progress Report on Cybersecurity in Israel

The CyberTech conference is a good introduction to cybersecurity in Israel, but the industry is booming throughout the country at an unprecedented rate.

Tracking the Digital Transition in the White House

As part of the digital transition in the White House, former President Barack Obama's social media records will be transferred to a separate archive.