Menu

Stories by David Geer

How to mitigate hackers who farm their victims

Feeling raked over? You’re not alone; someone is probably probing your low hanging fruit right now. CSO covers how hackers farm the enterprise and how companies can mitigate the risks.

Written by David Geer27 Sept. 16 20:45

How to keep viral memes from spreading malware in your enterprise

CSO shares the process attackers use to slip inside the enterprise through memes and games together with enterprise security policies and enforcements that help ensure the next viral internet craze doesn’t lead to malware playtime inside your organization.

Written by David Geer31 Aug. 16 20:10

Why smart devices and wearables will be security's new headache

Smart devices largely use the same operating system as their smartphone counterparts. This is the case with Android devices. When we talk about smart devices and Android, we're talking about a mature platform in terms of malware.

Written by David Geer22 Jan. 15 03:15

Why the board of directors will go off on security in 2015

Imagine it's the end of 2015 and you're about to read an expose from a fly on the wall at top closed-room board meetings across the enterprise discussing the state of information security. You're excited, right?

Written by David Geer11 Dec. 14 02:35

Box, Dropbox, or drop both?

"There are four critical questions every enterprise and IT administrator should ask when considering file sharing services," says Adam Gordon, author of "Official (ISC)2 Guide to the CISSP CBK, Third Edition ((ISC)2 Press)." These include: Where will the service store and share files? Who will view the files? How will the service protect the files? And, what types of files will the service permit in the storage system? If a service provider doesn't respond satisfactorily, CISOs should consider their options.

Written by David Geer10 March 14 16:49

The Internet of Things: Top five threats to IoT devices

The Internet of Things (IoT) is a mass of billions of connected devices from cars to wireless wearable products. Cisco's Internet Business Solutions Group estimated 12.5 billion connected devices in existence globally as of 2010 with that number doubling to 25 billion by 2015.

Written by David Geer09 Jan. 14 17:11

Five places your data goes to hide

"Information wants to be free" is a gross understatement.
Enterprises blanket their systems with security in the attempt to saturate every data repository with protection. Organisations affirm the logic of layering everything from access management to security zones to safeguard information assets. Yet, somehow, data still leaks. Real world exposure occurs virtually on a day-to-day basis.

Written by David Geer20 Jan. 13 22:00

Market Place