David Geer

A former ISP/telecom technician, David Geer writes about information security and a host of technologies for national and international publication.

How to respond to device and software backdoors inserted or left by vendors

6 of the most effective social engineering techniques

6 of the most effective social engineering techniques

It takes a layered approach to technology and added protections and assurances for your people to fight social engineering

How to wake the enterprise from IoT security nightmares

How to wake the enterprise from IoT security nightmares

Solutions present and future for IoT security scares that keep you up at night

Free cybersecurity tools for all your needs

Free cybersecurity tools for all your needs

There are enough quality gratis cybersecurity tools to make this free tool treasure hunt worth your while

Fixing the communications breakdown between IT security and the board and c-suite

Fixing the communications breakdown between IT security and the board and c-suite

Stop buying the first security solution that comes down the pike and solve the communications logjam first

Emerging technologies are poking holes in security

Emerging technologies are poking holes in security

Accelerated change challenges change management, security devops and emerging technologies that enable business innovation and opportunities demand fast, frequent change from the enterprise. The speed and regularity as well as the...

How to keep viral memes from spreading malware in your enterprise

How to keep viral memes from spreading malware in your enterprise

Stop! Infected Pokemon Go, games and memes are spreading malware

Real-life examples test whether you are prepared for a cyberattack

Real-life examples test whether you are prepared for a cyberattack

These tabletop exercises will update your response plan for live action

How to perform a risk assessment

How to perform a risk assessment

A risk assessment gives you the information protection equivalent of the opposing team’s playbook, telling where and how attackers are most likely to strike and what the damage will be.

Are vendors on the wrong path where smart plant security is concerned?

Are vendors on the wrong path where smart plant security is concerned?

Cyber criminals can't wait for enterprises to mainly apply access controls and encryption as their toughest solution for securing smart plants

Meet the man-in-the-middle of your next security crisis

Meet the man-in-the-middle of your next security crisis

That pesky, stealthy man-in-the-middle shows up everywhere from the cloud to SSL. You could be at a disadvantage if you don’t know where he’ll strike next

Security risks increase as cloud data centers change

Security risks increase as cloud data centers change

Change is always risky. Fast change is even riskier, leaving less time for change management and checks on changed technologies

Load More