
David Geer
A former ISP/telecom technician, David Geer writes about information security and a host of technologies for national and international publication.

Securing risky network ports
CSO examines risky network ports based on related applications, vulnerabilities, and attacks, providing approaches to protect the enterprise from malicious hackers who misuse these openings.

How to respond to device and software backdoors inserted or left by vendors
CSO looks at vendor backdoors, how they get into products, the challenges to finding these, mitigating the easily infected openings, and responding to this hardware, software, and IoT-based dilemma.

6 of the most effective social engineering techniques
It takes a layered approach to technology and added protections and assurances for your people to fight social engineering.

Ransomware picks off broader targets with greater severity
How to protect more critical organizations from evolving ransomware.

How to get your infrastructure in shape to shake off scriptable attacks
According to F-Secure’s The State of Cyber Security 2017 report, criminal hackers perform most cyber-attacks using basic, scriptable techniques against poorly maintained infrastructure. This will continue as long as there are loads of...
How to protect your data, your vehicles, and your people against automotive cyber threats?
CSO explores the vulnerabilities and risks of automotive cyber-attacks and methods for securing your data, human resources, and the connected vehicle environment.

How to wake the enterprise from IoT security nightmares
Solutions present and future for IoT security scares that keep you up at night.
SWIFT has not seen its last 'bank robbery'
Due to antiquated security mandates, banks participating in the SWIFT messaging system are vulnerable.

How to mitigate hackers who farm their victims
Feeling raked over? You’re not alone; someone is probably probing your low hanging fruit right now. CSO covers how hackers farm the enterprise and how companies can mitigate the risks.

Emerging technologies are poking holes in security
Accelerated change challenges change management, security DevOps and emerging technologies that enable business innovation and opportunities demand fast, frequent change from the enterprise. The speed and regularity as well as the...
How to keep viral memes from spreading malware in your enterprise
CSO shares the process attackers use to slip inside the enterprise through memes and games together with enterprise security policies and enforcements that help ensure the next viral internet craze doesn’t lead to malware playtime...