David Geer

A former ISP/telecom technician, David Geer writes about information security and a host of technologies for national and international publication.

How to deal with backdoors inserted or left by vendors

5 top IoT security nightmares

5 top IoT security nightmares

Solutions present and future for IoT security scares that keep you up at night.

Free tools for your cyber-security efforts

Free tools for your cyber-security efforts

There are enough quality gratis cyber security tools among the differing security product categories to make this free tool treasure hunt worth your while.

Real-life examples test whether you are prepared for a cyberattack

Real-life examples test whether you are prepared for a cyberattack

Use the following tabletop exercises -- based on today’s most disconcerting threats -- to update your response plan for live action.

How to perform a risk assessment

How to perform a risk assessment

A risk assessment gives you the information protection equivalent of the opposing team’s playbook, telling where and how attackers are most likely to strike and what the damage will be.

Reviewing incident response plans for data risk preparedness

Reviewing incident response plans for data risk preparedness

Don’t let holes in your incident response plan review open gaping vulnerabilities in how you act on security events.

Are companies on the wrong path where smart plant security is concerned?

Are companies on the wrong path where smart plant security is concerned?

Cyber criminals are far ahead of enterprises that are applying access controls and encryption as their toughest solutions for securing smart plants.

Security risks increase as cloud data centers change

Security risks increase as cloud data centers change

Change is always risky. Fast change is even riskier, leaving less time for change management and checks on changed technologies.

Send attackers on a wild goose chase with deception technologies

Send attackers on a wild goose chase with deception technologies

Deception is an information security approach for identifying and changing attacker behavior, tying up his time, and sending him packing.

How to kill remote-access trojans

How to kill remote-access trojans

Like their fleshy counterparts, these attacks travel in packs, leading additional malware components to gather and reassemble themselves before launching the ultimate attack.

8 penetration testing tools that will do the job

8 penetration testing tools that will do the job

Eight great pen test tools for testing your network security’s metal!

Malware remodeled: New tricks, new suits slamming enterprise resources

Malware remodeled: New tricks, new suits slamming enterprise resources

Time to beef up layered approaches to stop the new malware hoards at the door.

Load More