74 Posts

David Strom

Security Evangelist

David is an award-winning writer, speaker, editor, video blogger, and online communications professional who also advises numerous startup and well-established technology ventures. He began his career as an in-house IT analyst and has founded numerous technology print and online publications, such as editor-in-chief of Network Computing magazine and as part of the launch team of PC Week's Connectivity section. David has written two books and spoken around the world at various conferences and been on national radio and television talking about network technologies. He continues to build websites and publish articles on a wide variety of technology topics geared towards networking, security, channel, PC enthusiasts, OEMs, and consumers. In addition to these activities, he consults to vendors and evaluates emerging technologies, products, strategies, and trends to help position and improve their technology products.

Written By David Strom

The Evolution of Voice Authentication as a Security Method

Voice authentication has the potential to alter the security industry, but the access method comes with some drawbacks that should be considered.

Extracting Malware Behavior From DNS Records

A recent threat report from Infoblox found that the underlying DNS hosting infrastructure of most malware is housed in the U.S. and Germany.

The Secret Keys to Cryptowall’s Success

Why is the Cryptowall ransomware so successful? A lot of the credit goes to its developers, who integrated marketing tactics seamlessly.

The Price of Privacy: How Much Is Your Personal Data Worth to You?

Consumers are looking forward to smart homes and connected devices, but what will the cost be to keep the personal data collected safe?

The Hiring Shortage Hits Black-Hat Hackers

The skills gap is affecting black-hat hackers and legitimate security teams alike. But that skill shortage may wind up being a good thing for IT teams.

Why Privacy by Design Is Still Relevant

The concepts behind the Privacy by Design movement are years old, but many of the initial concepts are still relevant today.

Lessons Learned From a Master Inventor: An Interview with IBM’s Lisa Seacat DeLuca

Here are four lessons to take from the advice of Lisa Seacat DeLuca, a master inventor and omnichannel strategist for IBM Commerce.

Security Solutions for the Virtual Network: Part III

There are many security challenges stemming from the implementation of a virtual network, but luckily, there are ways to acclimate to the technology.

Security Challenges With the Virtual Network: Part II

A cloud-based virtual network is a far cry from the infrastructure most organizations currently have, which means it brings some security challenges.

Security and the Virtual Network: Part I

Virtual networks are becoming a popular choice for enterprises due to their flexibility, but it's not simple to select the right option.