David Strom


Latest from David Strom

ANALYSIS

Ten years on, Snowden has had tremendous impact – good and bad – on corporate security

Ten years ago, a young man left a nice job, his girlfriend and his home with just his laptops. His fantastic story changed the world and the way we think about our internet privacy. And today, we are still feeling the impact of the revelations from Edward Snowden (pictured) contained in thousands of documents he ...

US-EU data privacy framework approved but still could be inadequate

The E.U.-U.S. Data Privacy Framework, aimed at enabling data from companies such as Google LLC and Meta Platforms Inc. to move back and forth between the two jurisdictions, today was adopted by the European Union. Today’s action by the European Commission, the EU’s executive arm, follows their adoption by the U.S. Department of Commerce last week. The ...
ANALYSIS

State data privacy laws are changing fast – here’s what businesses need to know

With no federal data privacy law on the books, states are doubling down on new laws governing the protection of people’s data. In the past year, Delaware, Indiana, Iowa, Montana, Oregon, Tennessee and Texas have all enacted such laws, more than doubling the number states had them previously — those being California, Colorado, Connecticut, Utah ...
ANALYSIS

How AI and large language models can help cybersecurity firms improve their services

Just about every cybersecurity provider has an artificial intelligence-related story to tell these days. There are many security products and services that now come with built-in AI features, offering better ways to seek out and neutralize malware. Or they have new “co-pilot” add-ons that allow human operators to work hand-in-mouse with an AI-driven assistant to ...

Apps under attack: New federal report suggests ways to improve software code pipeline security

The National Security Agency and the Cybersecurity and Infrastructure Security Agency late last month issued an advisory memo to help improve defenses in application development software supply chains — and there’s a lot of room for improvement. Called Defending Continuous Integration/Continuous Delivery (CI/CD) Pipelines, the joint memo describes the various deployment risks and ways attackers can ...

The WeChat app is anything but private. If you must use it, here’s how to protect yourself.

What if we had an app on our phones that combined the functions of Facebook Messenger, Venmo payments, MyPatientChart health records and WhatsApp for making voice calls, and also allowed us to download all sorts of mobile apps and games like Apple Inc.’s App Store? Furthermore, what if such an app had absolutely no privacy controls, ...
ANALYSIS

Will passkeys finally come to pass? A progress report

We’re finally inching closer to curing our addiction to passwords. This week the FIDO Alliance put together an online event and posted a series of white papers to try to help businesses that want to move forward with passkeys — digital credentials that don’t require usernames and passwords — to host their first 12-step programs ...
ANALYSIS

Polymorphic malware and the rise of new ‘moving target’ defensive security

An old security technology that has gotten little attention is finally ready for a new closeup. It goes by the name polymorphic code — or alternatively, automated moving target defense or AMTD — and it has been around for nearly a decade. It came into its own around 2017 when was popularized by both malware writers ...
SPECIAL REPORT: AI, CYBERSECURITY AND THE SUPERCLOUD

‘Zero trust’ was supposed to revolutionize cybersecurity. Here’s why that hasn’t happened yet.

Despite more than a decade of talk, the seminal concept in cybersecurity of zero trust — the assumption that no user or device on a computer network can be trusted — hasn’t been implemented nearly as widely as one might expect from all of the attention. The problems include numerous practical and perceptual obstacles, coupled with ...

Identity fraud prevention provider Socure acquires Berbix for $70M

Socure Inc. today announced the acquisition of Berbix, an artificial intelligence-powered document verification startup, for $70 million in cash and stock. Socure has raised copious funds, with 14 different rounds, including one $450 million round in 2021, for a total of $742 million. The companies are in the middle of a trend in this market, as ...