David Geer

A former ISP/telecom technician, David Geer writes about information security and a host of technologies for national and international publication.

State-of-the-art multifactor authentication (MFA) technologies

Securing risky network ports

Securing risky network ports

CSO examines risky network ports based on related applications, vulnerabilities, and attacks, providing approaches to protect the enterprise from malicious hackers who misuse these openings.

7 sexy high-tech enterprise ‘surveillance engineering’ techniques that criminal hackers use

7 sexy high-tech enterprise ‘surveillance engineering’ techniques that criminal hackers use

7 ways criminal hackers use high-tech surveillance—sometimes with a social engineering element—to tap into the enterprise to get the keys to your kingdom, or sensitive information.

How to respond to device and software backdoors inserted or left by vendors

How to respond to device and software backdoors inserted or left by vendors

CSO looks at vendor backdoors, how they get into products, the challenges to finding these, mitigating the easily infected openings, and responding to this hardware, software, and IoT-based dilemma.

6 of the most effective social engineering techniques

6 of the most effective social engineering techniques

It takes a layered approach to technology and added protections and assurances for your people to fight social engineering.

Ransomware picks off broader targets with greater severity

Ransomware picks off broader targets with greater severity

How to protect more critical organizations from evolving ransomware.

How to get your infrastructure in shape to shake off scriptable attacks

How to get your infrastructure in shape to shake off scriptable attacks

According to F-Secure’s The State of Cyber Security 2017 report, criminal hackers perform most cyber-attacks using basic, scriptable techniques against poorly maintained infrastructure. This will continue as long as there are loads of...

How to protect your data, your vehicles, and your people against automotive cyber threats?

How to protect your data, your vehicles, and your people against automotive cyber threats?

CSO explores the vulnerabilities and risks of automotive cyber-attacks and methods for securing your data, human resources, and the connected vehicle environment.

How to wake the enterprise from IoT security nightmares

How to wake the enterprise from IoT security nightmares

Solutions present and future for IoT security scares that keep you up at night.

SWIFT speaks on fraudulent messages and the security moves the cooperative is making to assist its customers

SWIFT speaks on fraudulent messages and the security moves the cooperative is making to assist its customers

SWIFT is using a multipronged approach to address interbank messaging fraud.

Free security tools to support cyber security efforts

Free security tools to support cyber security efforts

There are enough quality gratis cyber security tools among the differing security product categories to make this free tool treasure hunt worth your while.

SWIFT has not seen its last 'bank robbery'

SWIFT has not seen its last 'bank robbery'

Due to antiquated security mandates, banks participating in the SWIFT messaging system are vulnerable.

Load More