David Strom

David Strom writes and speaks about security, networking and communications topics for CSO Online, Network World, Computerworld, and other publications. He can be reached through his web site, or on Twitter @dstrom.

5 trends shaking up multi-factor authentication

5 trends shaking up multi-factor authentication

Perhaps the biggest surprise in our review of nine multi-factor authentication products is that physical tokens are making a comeback. Many IT managers were hoping that software-based tokens, which are easier to deploy and manage,...

Netanyahu: “I want Israel to become a cyber power”

Netanyahu: “I want Israel to become a cyber power”

Speaking at CyberTech 2016, Israeli prime minister calls for cross-country sharing of cyber threat info.

First Look: Google’s Pixel C tablet is sexy but won’t replace your laptop

First Look: Google’s Pixel C tablet is sexy but won’t replace your laptop

Pixel C is the first all-Google Android tablet. It has a 10.2-inch screen and is designed to be used with a companion keyboard that also doubles as a protective cover. The tablet isn’t quite a total replacement for your laptop but it...

How to evaluate password managers

How to evaluate password managers

All password managers have up to as many as four separate products for storing passwords, but not all tools support all four mechanisms.

Review: Best password managers for the enterprise

Review: Best password managers for the enterprise

Password managers are an important first step for organizations that want to strengthen their security by helping users cope with multiple logins.

Review: Password managers help keep hackers at bay

Review: Password managers help keep hackers at bay

LastPass, Keeper top the field in test of 10 password managers.

New endpoint security tools target zero-day attacks

New endpoint security tools target zero-day attacks

Most enterprises want an endpoint product that can prevent zero-day exploits and they want to be more proactive. We looked at two relatively new products, Carbon Black (now owned by Bit9) and Cylance Protect. Both are designed to...

Review: Carbon Black and Cylance: The new face of endpoint security

Review: Carbon Black and Cylance: The new face of endpoint security

We looked at two relatively new products, Carbon Black (now owned by Bit9) and Cylance Protect. Both are designed to approach securing your endpoints from a different and more complete perspective.

Free download: A get-up-to-speed guide on hyper-converged infrastructure

A quickly evolving market with newcomers and some old-timers too

Free download: A get-up-to-speed guide on VDI

Learn how VDI can help your organization navigate shifts in business, and user needs

Free download: A get-up-to-speed guide on moving legacy apps to the cloud

There are many benefits to migrating legacy apps to the cloud—and many paths to success. This guide explains how to make that transition.

REVIEW: Email encryption has gotten so much better, so you’d be crazy not to use it

REVIEW: Email encryption has gotten so much better, so you’d be crazy not to use it

Hushmail, Virtru, HP Voltage, Datamotion, AppRiver, ProtonMail, Tutanota offer options for protecting emails from prying eyes.

Review: Best tools for email encryption

Review: Best tools for email encryption

Email encryptionRecipients of encrypted emails once had to share the same system as the sender. Today, products have a “zero knowledge encryption” feature, which means you can send an encrypted message to someone who isn’t on your...

Review: Single sign-on tools offer impressive new capabilities

Review: Single sign-on tools offer impressive new capabilities

Centrify edges Okta and OneLogin in seven-vendor shootout.

Best tools for single sign-on

Best tools for single sign-on

Single mindednessSince we last looked at single sign-on products in 2012, the field has gotten more crowded and more capable. For this round of evaluations, we looked at seven SSO services: Centrify’s Identity Service, Microsoft’s...

These organizations will train, mentor and help you find your next job for free

Looking for a career change? These initiatives are committed to preparing you for a new job in the tech sector in your community

Paying too much for cloud services? These five tools can help cut your cloud costs

Paying too much for cloud services? These five tools can help cut your cloud costs

While it is great that cloud providers base their fees on what resources you actually consume, the various elements of your bill are daunting and complex, to say the least.

Best tools for cutting cloud costs

Best tools for cutting cloud costs

Cutting cloud costsImage by ShutterstockAs you move workloads to the cloud, you’ve probably already discovered that keeping track of your monthly cloud computing bills isn't easy. For this article, we looked at five shopping...

Review: Portnox, Extreme lead NAC pack

Review: Portnox, Extreme lead NAC pack

Network Access Control (NAC) products continue to get better and easier to use.

NAC is back. And better than ever

NAC is back. And better than ever

A NAC for securityFor this review, we were able to bring the following five vendors together: Enterasys/Extreme Networks Mobile IAM, Hexis Cyber Solutions NetBeat NAC, Impulse Point SafeConnect NAC, Pulse Policy Secure, and Portnox...

Load More