Skip to main content

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content.
You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Managing your cookies

Our website uses cookies. You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button.

Necessary cookies

These are essential for the user navigation and allow to give access to certain functionalities such as secured zones accesses. Without these cookies, it won’t be possible to provide the service.
Matomo on premise

Marketing cookies

These cookies are used to deliver advertisements more relevant for you, limit the number of times you see an advertisement; help measure the effectiveness of the advertising campaign; and understand people’s behavior after they view an advertisement.
Adobe Privacy policy | Marketo Privacy Policy | Pardot Privacy Policy | Oktopost Privacy Policy | MRP Privacy Policy | AccountInsight Privacy Policy | Triblio Privacy Policy

Social media cookies

These cookies are used to measure the effectiveness of social media campaigns.
LinkedIn Policy

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

About David Storch


Security Consultant IV

David Storch is a displaced American and, worse, a displaced New Yorker. He finds the customs and language of the inhabitants of the UK curious but only occasionally alarming. Unlike many of his peers, David has almost no interest in gadgets. He thinks if you have a Facebook page this is proof that you have too much time on your hands and misaligned priorities to boot. He does however have a SatNav and thinks it the greatest invention of the last few centuries. He has an MBA and is interested in the intersection of technology and ‘life improvement’, which can then be translated into business and consumer benefit. With a background in Marketing, he likes to separate real value from purported value, dissecting the facts from the fiction. He likes to think about Big Problems and Large Issues. His favourite quote of late is ‘May you live in interesting times.’ He misses good pizza.




Articles posted by David Storch

Cognitive cybersecurity approaches: Protecting utility OT in a hyper-connected world

Edge devices, the Internet of Things, wearables and swarm computing: emerging systems are enabling new utility business models. But they can also expose critical energy networks to new security threats. In a hyperconnected world, utilities will need to adopt new approaches for protecting their operational technology (OT). A cognitive cybersecurity approach is vital…

The Information Heist: a Lead to Serious Data Valuing

We are all witnessing some of the greatest thefts in history, but few people seem to be taking note. Numerous entities - ranging from individual hackers, dubious cyber-collectives, corporate bodies and even governments - are quite literally stealing everything from email data to design patents. Everything is at risk. Intellectual property and processes that have taken…

Smartphones: Virtual Risk, Real World Consequences

In late 2014 Apple retained its title as the world’s most valuable brand, though this time with a new accolade: setting the record as the first company valued at $700bn. This news came with very little surprise. The smartphone market is one of the most lucrative in the world – last year 1.2bn were sold. For want of a better word,…

The Great Brain Robbery

We are witnessing the greatest theft in history and few people seem to be taking note. This theft makes the great train robbery seem like a purse snatching. Would any screenwriter have dared to supply a plot as outlandish as what is happening today? Blofeld and Scaramanga are pedestrian by comparison, even charmingly benign. What writer would have a villain say, 'Well, Mr. Bond,…

Know Thy Customer

The Wall Street Journal European Edition of 14 February 2013 reports that the EEOC (Equal Employment Opportunity Commission) in the USA issued guidance that businesses should in effect hire more (former) criminals. Employers should not allow a history of criminal conviction to unduly influence them when it comes to hiring. If two people are very similarly qualified, employers should not simply rule out one because…

Mobile Devices Trump Security

The battle between convenience/sexiness and security marches on. It probably won’t be hard to pick the winner. I’m not the first person to note that the consumer market is driven by convenience and by the rather hard to define ‘x-factor’ of ‘sexiness’. Few products in recent IT history have brought together convenience and sexiness in one package more than the smartphone and other mobile…