Ebyline Approved
5 Jobs Completed

David Strom

St Louis, MO, USA

He has had several editorial management positions for both print and online properties in the enthusiast, gaming, IT, network, channel, and electronics industries, including the editor-in-chief of Network Computing print, Digital Landing.com, and Tom's Hardware.com. He currently writes for PC Magazine, Slashdot, Computerworld, Techtarget and Network World.

  • network computing
  • network security
  • internet applications
  • web content
  • Information Technology

Featured Work

  • Three examples of multifactor authentication use cases
    Information Security information, news and tips - SearchSecurity

    Before purchasing multifactor authentication software, your company should first be aware of common scenarios, including AD identity and web services. This article focuses on three multifactor authentication use cases that can help prevent phishing scams and attacks.

  • Building your forensic analysis toolset
    CSO Online

    Every security team should have these types of digital forensics tools available. Many are free, and there are enough options to find one that suits your skills and approach.

  • Best WordPress security: Top tools and best practices
    CSO Online

    Poorly secured WordPress websites are a favorite hacker target. Use these tools and advice to keep them out.

  • 10 Slack security tools compared
    CSO Online

    Slack does a good job of protecting its own code, but you'll need help to stop malware delivered through Slack messages or to avoid exposing personal information.

  • How to set up a successful digital forensics program
    CSO Online

    The time to set up a digital forensics program is before you have a breach. Here are the decisions you need to make.

  • The latest collaboration tools: Microsoft Live Spaces and IBM Lotus Live Engage
    IT news, technology analysis and how-to resources | ITworld

    ITworld covers a wide range of technology topics, including software, security, operating systems, mobile, storage, servers and data centers, emerging tech, and technology companies such as Microsoft, Google and Apple.

  • How to extract your LinkedIn, Facebook contacts
    IT news, technology analysis and how-to resources | ITworld

    ITworld covers a wide range of technology topics, including software, security, operating systems, mobile, storage, servers and data centers, emerging tech, and technology companies such as Microsoft, Google and Apple.

  • Using Box.net for online storage
    IT news, technology analysis and how-to resources | ITworld

    ITworld covers a wide range of technology topics, including software, security, operating systems, mobile, storage, servers and data centers, emerging tech, and technology companies such as Microsoft, Google and Apple.

  • Top application security tools for 2019
    CSO Online

    Checking for security flaws in your applications is essential. These tools can help find and fix them.

  • What is application security? A process and tools for securing software
    CSO Online

    Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Checking for security flaws in your applications is essential as threats become more potent and prevalent.