David Geer

A former ISP/telecom technician, David Geer writes about information security and a host of technologies for national and international publication.

How to deal with backdoors inserted or left by vendors

5 top IoT security nightmares

5 top IoT security nightmares

Solutions present and future for IoT security scares that keep you up at night.

Free tools for your cyber-security efforts

Free tools for your cyber-security efforts

There are enough quality gratis cyber security tools among the differing security product categories to make this free tool treasure hunt worth your while.

Real-life examples test whether you are prepared for a cyberattack

Real-life examples test whether you are prepared for a cyberattack

Use the following tabletop exercises -- based on today’s most disconcerting threats -- to update your response plan for live action.

How to perform a risk assessment

How to perform a risk assessment

A risk assessment gives you the information protection equivalent of the opposing team’s playbook, telling where and how attackers are most likely to strike and what the damage will be.

Reviewing incident response plans for data risk preparedness

Reviewing incident response plans for data risk preparedness

Don’t let holes in your incident response plan review open gaping vulnerabilities in how you act on security events.

Are companies on the wrong path where smart plant security is concerned?

Are companies on the wrong path where smart plant security is concerned?

Cyber criminals are far ahead of enterprises that are applying access controls and encryption as their toughest solutions for securing smart plants.

Security risks increase as cloud data centers change

Security risks increase as cloud data centers change

Change is always risky. Fast change is even riskier, leaving less time for change management and checks on changed technologies.

How to identify and thwart insider threats

How to identify and thwart insider threats

Are you the type? Insider archetypes map and model personalities and behaviors that could be clues to the next attack on your business.

Keep these cyberthug holidays marked on your calendar

Keep these cyberthug holidays marked on your calendar

They won’t knock on the front door bearing gifts and treats, but sooner or later, you’ll know these goons have arrived as you and your organization foot the bill for their good time.

Send attackers on a wild goose chase with deception technologies

Send attackers on a wild goose chase with deception technologies

Deception is an information security approach for identifying and changing attacker behavior, tying up his time, and sending him packing.

How to kill remote-access trojans

How to kill remote-access trojans

Like their fleshy counterparts, these attacks travel in packs, leading additional malware components to gather and reassemble themselves before launching the ultimate attack.

Load More