77 Posts

David Strom

Security Evangelist

David is an award-winning writer, speaker, editor, video blogger, and online communications professional who also advises numerous startup and well-established technology ventures. He began his career as an in-house IT analyst and has founded numerous technology print and online publications, such as editor-in-chief of Network Computing magazine and as part of the launch team of PC Week's Connectivity section. David has written two books and spoken around the world at various conferences and been on national radio and television talking about network technologies. He continues to build websites and publish articles on a wide variety of technology topics geared towards networking, security, channel, PC enthusiasts, OEMs, and consumers. In addition to these activities, he consults to vendors and evaluates emerging technologies, products, strategies, and trends to help position and improve their technology products.

Written By David Strom

The Evolving State of the Mobile Endpoint

Two recent surveys examined the state of endpoint management and security in the enterprise, turning up more than a few interesting points.

The Growing Threat From Emerging Cybercrime Markets

As more people gain internet access around the globe, new cybercrime markets begin to appear. Here's what you should know about this new threat.

Know Your Vendor Security Practices

When you hire a third party for some IT work, do you really know about their vendor security practices? Google certainly does.

The Evolution of Voice Authentication as a Security Method

Voice authentication has the potential to alter the security industry, but the access method comes with some drawbacks that should be considered.

Extracting Malware Behavior From DNS Records

A recent threat report from Infoblox found that the underlying DNS hosting infrastructure of most malware is housed in the U.S. and Germany.

The Secret Keys to Cryptowall’s Success

Why is the Cryptowall ransomware so successful? A lot of the credit goes to its developers, who integrated marketing tactics seamlessly.

The Price of Privacy: How Much Is Your Personal Data Worth to You?

Consumers are looking forward to smart homes and connected devices, but what will the cost be to keep the personal data collected safe?

The Hiring Shortage Hits Black-Hat Hackers

The skills gap is affecting black-hat hackers and legitimate security teams alike. But that skill shortage may wind up being a good thing for IT teams.

Why Privacy by Design Is Still Relevant

The concepts behind the Privacy by Design movement are years old, but many of the initial concepts are still relevant today.

Lessons Learned From a Master Inventor: An Interview with IBM’s Lisa Seacat DeLuca

Here are four lessons to take from the advice of Lisa Seacat DeLuca, a master inventor and omnichannel strategist for IBM Commerce.