Tom Spring's profile photo

Tom Spring

Boston

Senior Editorial Director at SC Media

reporter, writer, editor, skeptic and all-around amazing person. Oh, and also a journalist at SC Media.

Articles

  • 2 weeks ago | scworld.com | Tom Spring

    It’s a big day at SC Media: we’re thrilled to announce the finalists for the 2025 SC Awards. This year we received hundreds of submissions across 33 categories, spanning both the Excellence and Trust Awards, and the result is a finalist roster that reflects an evolving cybersecurity industry. From AI-powered threat detection to identity solutions designed for non-human users, finalists aren’t just innovators, they are business enablers. View the full list of 2025 SC Awards finalists here.

  • 3 weeks ago | scworld.com | Tom Spring

    In this week's enterprise security news, Big funding for Island Is DLP finally getting disrupted? By something that works? We learn all about Model Context Protocol servers Integrating SSO and SSH! Do we have too many cybersecurity regulations? Toxic cybersecurity workplaces Napster makes a comeback this week, we’ve got 50% less AI and 50% more ...

  • 3 weeks ago | scworld.com | Tom Spring

    Compromised identities now account for one-third of security incidents, and more than 90% of organizations reported multiple identity-related breaches in the last year—an urgent backdrop for what comes next. Enter Identiverse 2025—a four-day deep dive into the technologies, strategies, and innovations reshaping the way businesses secure identities in an era of AI, automation, and digital transformation.

  • 3 weeks ago | scworld.com | Tom Spring

    Tom Spring is Editorial Director for SC Media and is based in Boston, MA. For two decades he has worked at national publications in the leadership roles of publisher at Threatpost, executive news editor PCWorld/Macworld and technical editor at CRN. He is a seasoned cybersecurity reporter, editor and storyteller that aims always for truth and clarity.

  • 4 weeks ago | scworld.com | Tom Spring

    Unmasking the identities of cybercriminals hiding behind VPN and proxy services is cat and mouse game as old as default passwords. Now, a team of university researchers from Denmark and India claim to have developed a novel technique capable of unmasking cybercriminals hiding behind VPNs, proxy servers and Tor browsers with up to 70% reliability.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →

X (formerly Twitter)

Followers
951
Tweets
1K
DMs Open
Yes
tom spring
tom spring @zpring
17 Jul 23

https://t.co/XTwyhHmsLp

tom spring
tom spring @zpring
30 Jun 23

RT @KimZetter: "G/O Media informed editorial staff that it will begin a 'modest test' of artificial intelligence (AI) content on its websit…

tom spring
tom spring @zpring
2 Jun 23

RT @jeffespo: Yesterday @Kaspersky released details on #IOSTriangulation - today they're releasing tools to help anybody check if they've b…