David Strom

David Strom writes and speaks about security, networking and communications topics for CSO Online, Network World, Computerworld, and other publications. He can be reached through his web site, or on Twitter @dstrom.

Paying too much for cloud services? These five tools can help cut your cloud costs

Paying too much for cloud services? These five tools can help cut your cloud costs

While it is great that cloud providers base their fees on what resources you actually consume, the various elements of your bill are daunting and complex, to say the least.

Review: Portnox, Extreme lead NAC pack

Network Access Control (NAC) products continue to get better and easier to use.

Why Israel could be the next cybersecurity world power

There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at becoming something more modest, and...

Uptime simplifies system and server monitoring

Server and systems management tools have long been too expensive and too complex to actually use without spending thousands of dollars on consultants. Uptime Software has been trying to change that with a product that can be installed...

How to bridge and secure air gap networks

The state of the art on Air Gap networks is changing with both better protective technologies and sneakier threats that take advantage of some very elegant and extreme hacks.

How to pick the right MOOC

Hundreds of free online classes from the world's leading instructors are at your fingertips. Here's what you need to get started.

Why – and how – to do a better job of listening to your end user customers

IT managers haven't always been the best listeners. Here are some strategies to consider, taken from the best and worst customer interaction stories heard at a recent conference.

Slow Internet links got you down? It’s Dyn to the rescue

Slow Internet links got you down? It’s Dyn to the rescue

Dyn’s Internet Intelligence helps IT execs troubleshoot wide-area traffic slowdowns and compare ISP performance.

Review: Citrix Xen Mobile rates a spot on your MDM short list

XenMobile 9.0 delivers topnotch features, granular security policies.

How Aryaka’s global private network speeds access to Internet apps

Managed cloud service offers alternative to DIY or WAN optimization appliances.

Unisys unveils invisibility cloak for network traffic

If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle...

Secure browsers offer alternatives to Chrome, IE and Firefox

The Web browser has been a major infection vector for years, allowing malware to be transported to millions of computers through phishing, man-in-the-middle, SQL injection and countless other attacks. But what if there were a way to...

Virtual machine (VM) security still a work in progress

Trying to protect your expanding virtual machine (VM) empire will require a security product that can enforce policies, prevent VMs from being terminated or infected, and deliver the virtual equivalents of firewalls, IPS and...

Remembering Quark and AppleTalk, Netware and Gopher

The Apple Mac has played an important part of my professional journalism career for at least 20 of the years that I have been a writer. One Mac or another has been my main writing machine since 1990, and has been in daily use,...

Review: Best tools for mobile device management

Mobile device management tools make sense when you are trying to control who can access your enterprise network and applications from particular phones and tablets. But to effectively evaluate these products, you should first identify...

Best tools for protecting passwords

For enterprises trying to get a handle on password management, the good news is that there are products that can help implement stronger password policies for end users logging into corporate and personal Web-based services, as well...

What to look for when evaluating password manager software

Here are the significant issues that can distinguish one password manager product from another. You'll probably make a similar list of requirements as you do your own research for password managers.

Shootout results: Best security tools for small business

If you run a small business, you have a lot of choices to protect your network. You can buy a consumer-grade router for less than $50, you can spend more than $4,000 for an enterprise firewall, or you can select something in between.

Smartphones take center stage in two-factor authentication schemes

We all know that relying on a simple user ID and password combination is fraught with peril. One alternative is to use one of the single sign-on solutions we reviewed last year, but there are less expensive options that could also be...

How to tell if your Twitter, Facebook and LinkedIn efforts are paying off

As businesses make more use of social networks, the number of engagement, analysis and monitoring tools has exploded. Enterprises are trying to understand their return on social media investments, to find out if their Twitter and...

Load More