David Strom

David Strom writes and speaks about security, networking and communications topics for CSO Online, Network World, Computerworld, and other publications. He can be reached through his web site, or on Twitter @dstrom.

What is Traffic Light Protocol? Here's how it supports CISOs in sharing threat data

Secure web browsers for the enterprise compared: How to pick the right one

Secure web browsers for the enterprise compared: How to pick the right one

These enterprise-grade, Chromium-based web browsers are designed for the security needs of the enterprise, not the consumer.

CNAPP buyers guide: Top tools compared

CNAPP buyers guide: Top tools compared

Cloud native application protection platforms aim to provide a complete cloud security solution, but some are more complete than others.

How to choose a certificate management tool

How to choose a certificate management tool

Managing certificates that hold all your encryption secrets is impossible without the right tool. Here's how to narrow the field.

How to choose the best VPN for security and privacy

How to choose the best VPN for security and privacy

Virtual private networks still have a place in the enterprise for protecting data and networks. Here's what you need to know when selecting a VPN.

How to evaluate SOC-as-a-service providers

How to evaluate SOC-as-a-service providers

Not every organization that needs a security operations center can afford to equip and staff one. A number of providers provide SOC as a service. Here's what you need to know about them and how the market has matured.

Top tools and best practices for WordPress security

Top tools and best practices for WordPress security

Poorly secured WordPress websites are a favorite hacker target. Use these tools and advice to keep them out.

12 risk-based authentication tools compared

12 risk-based authentication tools compared

Risk-based authentication tools have become more sophisticated and popular as companies transition away from dependence on password protection.

Red vs. blue vs. purple teams: How to run an effective exercise

Red vs. blue vs. purple teams: How to run an effective exercise

Playing the role of an attacker can make your team better at defense if you include all the stakeholders and carefully design goals.

What is Magecart? How this hacker group steals payment card data

What is Magecart? How this hacker group steals payment card data

Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk.

9 cloud and on-premises email security suites compared

9 cloud and on-premises email security suites compared

These email security suites have evolved to keep pace with email-enabled threats.

MITRE ATT&CK framework: Understanding attack methods

MITRE ATT&CK framework: Understanding attack methods

The MITRE ATT&CK framework is a living, growing document of threat tactics and techniques that have been observed from millions of attacks on enterprise networks.

Load More