94 Posts

David Strom

Security Evangelist

David is an award-winning writer, speaker, editor, video blogger, and online communications professional who also advises numerous startup and well-established technology ventures. He began his career as an in-house IT analyst and has founded numerous technology print and online publications, such as editor-in-chief of Network Computing magazine and as part of the launch team of PC Week's Connectivity section. David has written two books and spoken around the world at various conferences and been on national radio and television talking about network technologies. He continues to build websites and publish articles on a wide variety of technology topics geared towards networking, security, channel, PC enthusiasts, OEMs, and consumers. In addition to these activities, he consults to vendors and evaluates emerging technologies, products, strategies, and trends to help position and improve their technology products.

Written By David Strom

Ransomware Takes a Scary Turn Using JavaScript

A relatively new type of ransomware called Ransom32 is leveraging JavaScript to bypass detection tools and infect computer systems.

What Makes for a Useful Medical Patient Portal?

Having a patient portal that's high on security and usability is essential for modern health care practitioners. What are the benefits of these systems?

How Blockchain Ledger Technology Is Coming of Age

Blockchain technologies are useful for more than just bitcoin. IBM's John Wolpert explained what the company is doing to move this tech forward.

Do Year-End Wrap-Ups Add New Insights on Security Challenges?

Some publications have done year-end reviews and made predictions about security challenges in 2016 without really understanding security itself.

Major Misconceptions About Cloud Security in European Financial Sector, New Survey Shows

A recent survey highlighted a knowledge gap regarding what European banks and financial institutions know about cloud security and cloud capabilities.

Why You Should Consider Using Privileged Password Access Managers

Password access managers may be the most viable solution to the lack of security surrounding login credentials — if they are used effectively.

How to Increase Your Travel Security Profile

You can improve your travel security profile by taking advantage of a few simple measures that have a massive impact on your personal well-being.

Testing Your SSL Encryption Can Provide Important Security Insights

New, free SSL encryption tests can show areas for improvement with regard to email protection and the best practices for maintaining application security.

Protecting From the Enemy Within: How Your IT Department Could Be Your Biggest Potential Enemy

Is your IT department the biggest insider threat facing your organization? Here's how to minimize the risk stemming from this first line of security.

The Role of Deliberate Obfuscation for Overall Data Security and Privacy

Deliberate obfuscation could be a viable method for organizations looking to maximize their data security and privacy through more advanced techniques.