Josh Fruhlinger

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

The security theory and troubling practice behind the TSA's PreCheck security lines

How to keep branch offices as secure as corporate HQ

How to keep branch offices as secure as corporate HQ

Satellite worksites can cause big headaches for tech pros tasked with keeping company assets secure. We talked to a number of tech pros to find out more about the dangers—and the solutions.

Who's on your IT security dream team?

Who's on your IT security dream team?

There are a number of important roles to fill, and I'm not just talking about job titles: I mean attitudes, and abilities that verge on superpowers. IT security is a team sport, so who do you want on your team?

The worst people you meet doing IT security

The worst people you meet doing IT security

Now I've collected specific kinds of insecure employees that infosec workers have had to deal with and protect—or protect their servers from. You'll definitely recognize people you work with on this list. Hopefully you won't recognize...

The internet of insecure things: Thousands of internet-connected devices are a security disaster in the making

The internet of insecure things: Thousands of internet-connected devices are a security disaster in the making

We talked to a host of tech experts about the state of security in the IoT world, and found out the good, the bad, and the very ugly.

Down but not out of options: How to keep IT security together in a company that's gone bankrupt

Down but not out of options: How to keep IT security together in a company that's gone bankrupt

If you're working for a company that's filed for bankruptcy, you're definitely going to encounter choppy waters when it comes to maintaining tech security. We talked to IT pros who have been through it to find out the best ways to...

Security is no fiction: Infosec on TV, film—and in space

Security is no fiction: Infosec on TV, film—and in space

Has film and TV depiction of IT security gotten any better since the '80s? We quizzed some tech pros hear their favorites and learn about the worst offenders.

How to keep IT security at the forefront during a merger

How to keep IT security at the forefront during a merger

Security pros weigh in on how to keep IT security at the forefront during a merger

Why the attack on the DNC won't be the last one like it

Why the attack on the DNC won't be the last one like it

Recorded Future has outlined a series of hacks targeting both campaigns over the past twelve months. The truth is that hackers have taken an interest in democracy and the electoral process for some time.

What security pros can learn from the networking team

What security pros can learn from the networking team

In truth, your security team has a lot to learn from the networking team about how to keep the whole organization running smoothly. We spoke to networking experts to find out what they most wanted security pros to know.

Just for show: 11 theatrical security measures that don't make your systems safer

Just for show: 11 theatrical security measures that don't make your systems safer

We talked to an array of tech experts to discover what security technologies are often just for show.

Kinder, gentler hacks: A bevy of low-stakes early computer breaches

Kinder, gentler hacks: A bevy of low-stakes early computer breaches

Today, IT security is a deadly serious business. But in the early days of computing, the stakes were a bit lower. Maybe it's just that we're seeing it through a nostalgic lens, but the computer breaches in the '70s, '80s, and '90s...

Load More