David Strom is one of the leading experts on network and Internet technologies and has written and spoken extensively on IT security and technology for more than 30 years. David has a Masters of Science, Operations Research degree from Stanford University, and a Bachelor of Science from Union College.
RSocks compromised its victims by brute forcing attacks on various IoT devices as well as smartphones and computers.
Exploring the evolution of self-sovereign data and Web 3.0 identity solutions.
While withholding a zero-day’s existence can provide some government advantage, it can potentially harm the rest of us and break many elements of the global internet if vulnerabilities aren’t disclosed and patched.
This year's DBIR offers practical advice on improving your security posture and tips for making yourself much less of a target.
“Phishing is more of a thing now because many people have turned to a criminal life and because Covid is a very successful phishing lure. We are all stretched thin, and as a result, we can make more security mistakes.”
The better we understand how adversaries can eavesdrop on our phones, the more confidence we can have in our privacy.
If you need some ammunition to fight for its acceptance across your company, we’ll bust a few MFA myths and help you convince folks to get onboard.
“This is the kind of policy we ordinarily associate with authoritarian states, not open societies. It does a disservice to our democratic values.”