Stories by David Geer

Can data lakes solve cloud security challenges?

By David Geer | 18 March, 2014 16:52

"Data Lake" is a proprietary term. "We have built a series of big data platforms that enable clients to inject any type of data and to secure access to individual elements of data inside the platform. We call that architecture the data lake," says Peter Guerra, Principal, Booze, Allen, Hamilton. Yet, these methods are not exclusive to Booze, Allen, Hamilton.

Box, Dropbox, or drop both?

By David Geer | 10 March, 2014 16:49 | 1 Comment

"There are four critical questions every enterprise and IT administrator should ask when considering file sharing services," says Adam Gordon, author of "Official (ISC)2 Guide to the CISSP CBK, Third Edition ((ISC)2 Press)." These include: Where will the service store and share files? Who will view the files? How will the service protect the files? And, what types of files will the service permit in the storage system? If a service provider doesn't respond satisfactorily, CISOs should consider their options.

Why security should monitor social media to prevent violence

By David Geer | 18 February, 2014 16:31

The lone actor

Statistics point to increased physical danger risks of cyberterrorism

By David Geer | 12 February, 2014 21:06

"Traditional terrorism refers to violent acts that indiscriminately target civilians," says Jon Iadonisi, former Navy SEAL, cyber security expert and co-founder, White Canvas Group. Traditional terrorists are largely interested in achieving or thwarting political or ideological goals in the process. "Cyberterrorism invokes the specific use of computer networks to induce violence against innocent civilians," says Iadonisi.

The Internet of Things: Top five threats to IoT devices

By David Geer | 09 January, 2014 17:11

The Internet of Things (IoT) is a mass of billions of connected devices from cars to wireless wearable products. Cisco's Internet Business Solutions Group estimated 12.5 billion connected devices in existence globally as of 2010 with that number doubling to 25 billion by 2015.

Big Data security, privacy concerns remain unanswered

By David Geer | 05 December, 2013 22:43 | 3 Comments

Approaches to storing, managing, analyzing and mining Big Data are new, introducing security and privacy challenges within these processes. Big Data transmits and processes an individual's PII as part of a mass of data--millions to trillions of entries--flowing swiftly through new junctions, each with its own vulnerabilities.

Best practices for safely moving data in and out of the Cloud

By David Geer | 11 November, 2013 17:45

As everyone knows, Cloud provider, Nirvanix, recently fell apart, declaring bankruptcy and leaving its customers in the lurch. Nirvanix gave enterprises less than a month to move their data to a new home. To avoid the fate of those customers, follow these best practices for safely moving data in and out of the Cloud.

Data breach notification laws, state and federal

By David Geer | 01 November, 2013 22:10

State and federal data breach notification laws have changed and are expanding more than a little bit. CISOs and CSOs should start here to expand their knowledge of the increasingly restrictive notification requirements that apply to their organizations.

The dangers of QR codes for security

By David Geer | 19 August, 2013 19:27

A large number of end-user computers are mobile devices and the lion's share of those are smartphones. APTs are increasingly targeting the mobile market.

3 things to consider before buying into Disaster Recovery as a Service

By David Geer | 01 July, 2013 14:45

Disaster Recovery as a Service (DRaaS) backs up the whole environment, not just the data.

How to determine your company's real risk appetite

By David Geer | 26 February, 2013 20:46

In a 2012 customer survey conducted by the Corporate Executive Board (CEB), 70 percent of respondents said they do not have a formal risk-appetite approach in place. "Seventeen percent said they have something in place that is actually working," confirms Matt Shinkman, senior director of risk management research and advisory at the CEB.

Cloud security rebuttal: Don't rebuke the many for the sins of the few

By David Geer | 22 January, 2013 14:35

Long-time cloud security advocate Chris Hoff challenges our recent '7 deadly sins' story

5 places your data goes to hide

By David Geer | 14 January, 2013 16:03

From autosaved spreadsheets to test systems using real data -- CISOs warn of five oft-overlooked sources of data leaks

7 deadly sins of cloud computing

By David Geer | 02 January, 2013 14:56

Increasing your use of cloud computing? Great! Making these common security mistakes? Not great!

3 more tabletop exercises for business continuity

By David Geer | 22 October, 2012 15:19

This set of 3 tabletop exercises has proven popular over the intervening years, so here's another troika for testing your processes for resilience or recovery.

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Audit Management Solutions

Manage the complete audit lifecycle from audit universe identification and risk assessment to management/board reporting and quality assurance.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.