Skip to primary content
Skip to secondary content

Web Informant

David Strom's musings on technology

Main menu

  • Home
  • IDG/Foundry
  • About me
  • Editorial archive
  • NY Times
  • Corporate blogger
  • Speeches

Search Results for: pc magazine

Post navigation

← Older posts
Newer posts →

Techtarget magazine: News from the NAC implementation front

Posted on September 3, 2008 by dstrom
Reply

Endpoint security is arguably the hot information security topic in 2006. Small wonder. No matter how diligently you defend your perimeter, roaming laptops are bound to introduce worms, viruses and spyware into your network. The mobility of commodity laptops equipped … Continue reading →

Posted in Published work, security | Leave a reply

Easy to swallow tablets (PC)

Posted on May 1, 2008 by dstrom
Reply

Not just for doctors and cops anymore, the new breed of tablet PCs could be the cure for your company’s mobile computing headaches. From hospital wards to police cruisers, tablet PCs have become a common sight among specialized users without … Continue reading →

Posted in Published work | Leave a reply

Information Security magazine: How honeyclients make a better Internet

Posted on November 2, 2007 by dstrom
Reply

Is it a coincidence that the Seinfeld Bee Movie is out the same day I can have lots of opportunity to pepper my own promo with lots of honey-related puns? I will resist, not that there is anything wrong with … Continue reading →

Posted in Published work, security | Leave a reply

PC Magcast: Wireless Security

Posted on April 30, 2007 by dstrom
Reply

Matt Sarrel, Dorothy Stanley of the WiFi Alliance and myself will be speaking at an online seminar next Tuesday, May 8th, about what you can do to make your wireless networks more secure. It is part of an all-day online … Continue reading →

Posted in speeches and podcasts, wireless networks | Leave a reply

CIO Magazine: Five Disruptive Techs CIOs Should Watch

Posted on August 16, 2006 by dstrom
Reply

This past year has seen some fairly big technology changes, largely the result of the confluence of a series of trends with new Web-based applications, new processor technologies, and new ways of managing networks. And sometimes the best ways to … Continue reading →

Posted in Published work | Leave a reply

Information Security Magazine: SSL VPNs aren’t so simple (c2006)

Posted on July 25, 2006 by dstrom
1

Corporations looking for new ways to enable roaming users to connect securely to their internal networks have latched onto Virtual Private Network Secure Sockets Layer (VPN SSL) gateway products. Unlike older VPN products that use secure TCP/IP protocols, the SSL … Continue reading →

Posted in Product reviews, Published work, security | 1 Reply

The evolution of internet faxing

Posted on January 28, 2022 by dstrom
2

Almost 30 years ago, two computer geeks – Marshall Rose and Carl Malamud — put together the first wide-scale attempt at sending faxes over the internet. In the beginning, it was fairly modest, with service reaching a few select cities … Continue reading →

Posted in Network applications | 2 Replies

Understanding career skeptics and the role of employee monitoring

Posted on September 29, 2021 by dstrom
4

We all know that the pandemic has had a major impact on employment patterns: not just more people working from home, but fewer people returning to their pre-Covid jobs. This has revealed what journalist Charlie Warzel calls career skeptics. His … Continue reading →

Posted in digital home | 4 Replies

FIR B2B Podcast: PR tips and my 21-year newsletter streak

Posted on November 2, 2016 by dstrom
Reply

In this week’s podcast with Paul Gillin on B2B marketing, I talk about my 21 years of writing a weekly Web Informant email newsletter. Last year I summarized my efforts in this piece with lots of links back to the early … Continue reading →

Posted in marketing, speeches and podcasts | Leave a reply

Brian Krebs and the Rise of Mexico’s ATM Skimmers

Posted on November 1, 2015 by dstrom
1

ATMs have long been targets for thieves; there was the Tyupkin malware, which could control cash drawers, reported on last fall. But a more popular form of attack is carried out via ATM skimmers, which are typically overlays attached to … Continue reading →

Posted in security | 1 Reply

Post navigation

← Older posts
Newer posts →

Recent Posts

  • My new genAI mini-me: meet Ada
  • Doing public relations in the lower literacy era: Sam Whitmore podcast
  • Peter Coffee enters his next career
  • Three new malware variants you might BOLO
  • Video podcast interview on the evolution of tech journalism

Archives

Categories

Proudly powered by WordPress