David Geer

A former ISP/telecom technician, David Geer writes about information security and a host of technologies for national and international publication.

Advances in multifactor authentication (MFA) technologies

Securing risky network ports

Securing risky network ports

CSO examines risky network ports based on related applications, vulnerabilities, and attacks, providing approaches to protect the enterprise from malicious hackers who misuse these openings.

How to respond to device and software backdoors inserted or left by vendors

How to respond to device and software backdoors inserted or left by vendors

CSO looks at vendor backdoors, how they get into products, the challenges to finding these, mitigating the easily infected openings, and responding to this hardware, software, and IoT-based dilemma.

6 of the most effective social engineering techniques

6 of the most effective social engineering techniques

It takes a layered approach to technology and added protections and assurances for your people to fight social engineering.

Ransomware picks off broader targets with greater severity

Ransomware picks off broader targets with greater severity

How to protect more critical organizations from evolving ransomware.

How to get your infrastructure in shape to shake off scriptable attacks

How to get your infrastructure in shape to shake off scriptable attacks

According to F-Secure’s The State of Cyber Security 2017 report, criminal hackers perform most cyber-attacks using basic, scriptable techniques against poorly maintained infrastructure. This will continue as long as there are loads of...

How to protect your data, your vehicles, and your people against automotive cyber threats?

How to protect your data, your vehicles, and your people against automotive cyber threats?

CSO explores the vulnerabilities and risks of automotive cyber-attacks and methods for securing your data, human resources, and the connected vehicle environment.

How to wake the enterprise from IoT security nightmares

How to wake the enterprise from IoT security nightmares

Solutions present and future for IoT security scares that keep you up at night.

Free security tools to support cyber security efforts

Free security tools to support cyber security efforts

There are enough quality gratis cyber security tools among the differing security product categories to make this free tool treasure hunt worth your while.

SWIFT has not seen its last 'bank robbery'

SWIFT has not seen its last 'bank robbery'

Due to antiquated security mandates, banks participating in the SWIFT messaging system are vulnerable.

Fixing the communications issues between IT security and the board and c-suite

Fixing the communications issues between IT security and the board and c-suite

Stop buying the first security solution that comes down the pike and solve the communications logjam first.

How to mitigate hackers who farm their victims

How to mitigate hackers who farm their victims

Feeling raked over? You’re not alone; someone is probably probing your low hanging fruit right now. CSO covers how hackers farm the enterprise and how companies can mitigate the risks.

Load More