David Geer

A former ISP/telecom technician, David Geer writes about information security and a host of technologies for national and international publication.

State-of-the-art multifactor authentication (MFA) technologies

7 sexy high-tech enterprise ‘surveillance engineering’ techniques that criminal hackers use

7 sexy high-tech enterprise ‘surveillance engineering’ techniques that criminal hackers use

7 ways criminal hackers use high-tech surveillance—sometimes with a social engineering element—to tap into the enterprise to get the keys to your kingdom, or sensitive information.

Ransomware picks off broader targets with greater severity

Ransomware picks off broader targets with greater severity

How to protect more critical organizations from evolving ransomware.

How to get your infrastructure in shape to shake off scriptable attacks

How to get your infrastructure in shape to shake off scriptable attacks

According to F-Secure’s The State of Cyber Security 2017 report, criminal hackers perform most cyber-attacks using basic, scriptable techniques against poorly maintained infrastructure. This will continue as long as there are loads of...

SWIFT speaks on fraudulent messages and the security moves the cooperative is making to assist its customers

SWIFT speaks on fraudulent messages and the security moves the cooperative is making to assist its customers

SWIFT is using a multipronged approach to address interbank messaging fraud.

SWIFT has not seen its last 'bank robbery'

SWIFT has not seen its last 'bank robbery'

Due to antiquated security mandates, banks participating in the SWIFT messaging system are vulnerable.

How to mitigate hackers who farm their victims

How to mitigate hackers who farm their victims

Feeling raked over? You’re not alone; someone is probably probing your low hanging fruit right now. CSO covers how hackers farm the enterprise and how companies can mitigate the risks.

Emerging technologies are poking holes in security

Emerging technologies are poking holes in security

Accelerated change challenges change management, security DevOps and emerging technologies that enable business innovation and opportunities demand fast, frequent change from the enterprise. The speed and regularity as well as the...

How to keep viral memes from spreading malware in your enterprise

How to keep viral memes from spreading malware in your enterprise

CSO shares the process attackers use to slip inside the enterprise through memes and games together with enterprise security policies and enforcements that help ensure the next viral internet craze doesn’t lead to malware playtime...

The evolution of DevOps: the perfect storm for instituting secure coding practices

The evolution of DevOps: the perfect storm for instituting secure coding practices

The nature of DevOps development approaches eases, invites, cries out for secure coding practices.

The enterprise is in an arm's race with cybercriminals

The enterprise is in an arm's race with cybercriminals

CSO explores the deep web, dwell time, and their roles in the balance of power in cybersecurity, pointing up defensive moves such as employing hackers and improving the effectiveness of employee education about social engineering /...

What is the right DDoS protection cloud service for your organization?

What is the right DDoS protection cloud service for your organization?

An expert’s eye view into how top DDoS protection cloud services perform on many levels.

Load More