77 Posts

David Strom

Security Evangelist

David is an award-winning writer, speaker, editor, video blogger, and online communications professional who also advises numerous startup and well-established technology ventures. He began his career as an in-house IT analyst and has founded numerous technology print and online publications, such as editor-in-chief of Network Computing magazine and as part of the launch team of PC Week's Connectivity section. David has written two books and spoken around the world at various conferences and been on national radio and television talking about network technologies. He continues to build websites and publish articles on a wide variety of technology topics geared towards networking, security, channel, PC enthusiasts, OEMs, and consumers. In addition to these activities, he consults to vendors and evaluates emerging technologies, products, strategies, and trends to help position and improve their technology products.

Written By David Strom

New Security Enhancements for Microsoft Windows Server 2016

Windows Server 2016 includes enhanced security features, such as VM encryption capabilities and a minimal Nano Server to reduce the attack surface.

Global City CIOs Launch New Organization to Promote Best Smart City Practices

A group of IT leaders from around the world formed the Council of Global City CIOs to promote information sharing when it comes to smart city initiatives.

UK Universities Make Rich Targets for Ransomware Attacks

Almost two-thirds of British universities fell victim to ransomware attacks in the past year, and the trend shows no signs of slowing down.

No Business Is Too Small for SMB Cybersecurity

Smaller businesses, like the HVAC company that caused the Target penetration in 2013, often think they are too small to be security targets, but SMB cybersecurity can have big implications. Size doesn’t matter as long as your firm has...

Use a Malware Simulator to Better Defend Against Ransomware

A malware simulator like the Shinosec ShinoLocker suite can help penetration testers understand how malware works and practice defending their systems.

The Increasing Dangers of Code Hooking

Cybercriminals use code hooking to intercept OS function calls to alter or augment their behavior. The technique is becoming more popular and dangerous.

Tracking Online Fraud: Check Your Mileage Against Endpoint Data

A new study analyzed 500,000 endpoints as a method of tracking online fraud. The 10,000 that were found to be compromised shared seven commonalities.

Protecting Your Network Through Understanding DNS Requests

Sometimes it just takes a little common sense and knowledge of your system log files and the DNS requests contained therein to detect a data breach.

The Rise of the Selfie Authentication as a New Security Factor

Many online vendors are moving toward more innovative and secure methods of confirming a user's identity, including selfie authentication.

Can You Still Protect Your Most Sensitive Data?

Companies in Silicon Valley and beyond are questioning how they should be protecting their sensitive data — if they choose to keep it at all.