Larry Seltzer, HPE

Larry Seltzer


Union, NJ, United States

Contact Larry

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

  • Unknown
  • HPE
  • CSOonline
  • ZDNet

Past articles by Larry:


Holiday scam alert: 6 scams to avoid

Online fraudsters usually claim to have information or authority they don’t have. Be on alert this holiday season. → Read More


How not to get ransomware. Tips and best practices.

Ransomware is a particularly malicious strain of malware. Following best practices is your best defense, but it’s important to know what to do if disaster strikes. → Read More

Running a capture the flag (CTF) competition: Top tools and resources

Capture the flag competitions can help improve security skills and identify talent. Use these tools and frameworks to design and run your own CTF event. → Read More


Despite proposed solutions, DNS security issues remain in tech industry

DNS security is a decades-old issue that shows no signs of being fully resolved. Find out the problems with proposed solutions and the best way to move forward. → Read More


Enterprise password management: A field guide

Learn why single sign-on password solutions aren't all they're cracked up to be, and get the basics of effective enterprise password management. → Read More

How Apple could lock down the iPhone to thwart government unlock orders

The new iOS devices with the Secure Enclave were supposed to be unhackable, even by Apple, but they aren't. What could Apple do to fix this? → Read More

Flash browser plugin is still not optional

The Adobe Flash browser plugin is a dynamite product. Incredibly useful and easy to use, but do the wrong thing and BOOM! I've been trying, with only limited success, to free myself of it. → Read More

Windows 10 updates still largely opaque

The details Microsoft provided for the Patch Tuesday updates to Windows 10 are vague and unactionable, but that's usually all we've ever gotten from them. → Read More

Your infrastructure's in the cloud and the Internet goes down. Now what?

When the Internet is down for us, many of the things we do become unavailable. Many organizations are, in effect, crossing their fingers rather than planning in earnest. → Read More

How to eliminate passwords? It can't be done

At the enterprise level IAM and SAML mitigate the password problem. Out on the civilian Internet our best attempts, mainly OAuth and OpenID, have fallen short. Passwords are a problem that will be with us for a long time. → Read More

Why Windows Phone isn't dead to me

If Microsoft has enough patience to stick with it, Windows Phone could be a much more successful platform within a few years. The future is the mobile web. → Read More

Endpoint management still fractured between mobile and desktop

Finally Microsoft has provided a way to unify endpoint management of mobile devices and Windows desktops, but it's doomed to many years of impracticality. → Read More

Google discloses unpatched Windows vulnerability

A Google researcher found a privilege elevation bug in Windows. After 90 days he made it public. He gives no indication that he contacted Microsoft. → Read More

How did the 2014 security predictions do?

The only real surprise I see is a good one having to do with Windows XP and Office 2003. There was other good news and lots of bad. → Read More

EMET your enterprise for peak Windows security

Microsoft's Enhanced Mitigation Experience Toolkit (EMET) tightens the security screws in Windows and applications. It's set up for enterprise deployment and management. → Read More

2015: Year of the Windows renaissance?

After largely avoiding Windows 8, I really got to like Windows 8.1. When Windows 10 comes along I'll feel a lot better about it and so, I suspect, will everyone else. → Read More

Flaw in MacBook EFI allows boot ROM malware

An attacker can introduce persistent boot ROM malware using an "evil maid" attack through the MacBook Thunderbird ports. → Read More

China dumping foreign tech; It could work

The Chinese government has been working for a long time on replacing foreign, largely American, technology with home-grown alternatives, but conditions are much better for them than in the past. → Read More

Unmanaged WordPress not usually worth the risk or trouble

The main lesson I take from the WordPress RevSlider attacks is that, for self-hosters, vigilance is absolutely necessary, but perhaps not enough, to keep your WordPress site secure from attack. → Read More

ICANN falls for spear phishing attack

E-mail credentials and a key DNS zone system were compromised. The severity of the damage is not yet clear. → Read More