David Strom, CSOonline

David Strom

CSOonline

St. Louis, MO, United States

Contact David

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • CSOonline
  • Network World
  • HPE
  • Citrix
  • PCMag
  • CIO.com
  • TechTarget
  • InfoWorld
  • Dice.com

Past articles by David:

What is Traffic Light Protocol? Here's how it supports CISOs in sharing threat data

Traffic Light Protocol (TLP) provides CISOs with best practice guidance on how to share sensitive data within an organization or externally. Here is how to use TLP and more on the latest version, TLP 2.0. → Read More

CNAPP buyers guide: Top tools compared

Cloud native application protection platforms aim to provide a complete cloud security solution, but some are more complete than others. → Read More

VPNs can complement SASE

New protocols help keep VPNs relevant in the face of secure access service edge and zero-trust network access. → Read More

How to choose the best VPN for security and privacy

Virtual private networks still have a place in the enterprise for protecting data and networks. Here's what you need to know when selecting a VPN. → Read More

Top tools and best practices for WordPress security

Poorly secured WordPress websites are a favorite hacker target. Use these tools and advice to keep them out. → Read More

12 risk-based authentication tools compared

Risk-based authentication tools have become more sophisticated and popular as companies transition away from dependence on password protection. → Read More

Red vs. blue vs. purple teams: How to run an effective exercise

Playing the role of an attacker can make your team better at defense if you include all the stakeholders and carefully design goals. → Read More

What is Magecart? How this hacker group steals payment card data

Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk. → Read More

What are DMARC, SPF and DKIM? How to master email security with these protocols

The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help. → Read More

How polls are hacked: What every business should know

The recent revelation that Michael Cohen paid to rig a presidential primary poll underscores the risks they present to business. Here's how to identify and prevent poll rigging. → Read More

Building your forensic analysis toolset

Every security team should have these types of digital forensics tools available. Many are free, and there are enough options to find one that suits your skills and approach. → Read More

Best WordPress security: Top tools and best practices

Poorly secured WordPress websites are a favorite hacker target. Use these tools and advice to keep them out. → Read More

10 Slack security tools compared

Slack does a good job of protecting its own code, but you'll need help to stop malware delivered through Slack messages or to avoid exposing personal information. → Read More

How to set up a successful digital forensics program

The time to set up a digital forensics program is before you have a breach. Here are the decisions you need to make. → Read More

Top application security tools for 2019

Checking for security flaws in your applications is essential. These tools can help find and fix them. → Read More

What is application security? A process and tools for securing software

Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Checking for security flaws in your applications is essential as threats become more potent and prevalent. → Read More

HPE

10 security trends to watch in 2019

Beef up your infosec in 2019 with these recommendations. → Read More

The Sony hacker indictment: 5 lessons for IT security

The recent indictment of North Korean hacker Park Jin Hyok contains valuable information from the FBI’s investigation that will help you defend against similar attacks. → Read More

New tools protect your AWS infrastructure

Rhino Security and Amazon offer tools to improve visibility into your AWS cloud environments, making it easier to find configuration errors and vulnerabilities. → Read More

How to perform a risk assessment: Rethinking the process

New regulations and a changing threat landscape mean you need a different approach to your security risk assessment process. → Read More