Josh Fruhlinger

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

The opinions expressed in this blog are those of the author and do not necessarily represent those of ITworld, its parent, subsidiary or affiliated companies.

Security is no fiction: Infosec on TV, film—and in space

How to keep IT security at the forefront during a merger

How to keep IT security at the forefront during a merger

Security pros weigh in on how to keep IT security at the forefront during a merger

Why the attack on the DNC won't be the last one like it

Why the attack on the DNC won't be the last one like it

Recorded Future has outlined a series of hacks targeting both campaigns over the past twelve months. The truth is that hackers have taken an interest in democracy and the electoral process for some time.

What security pros can learn from the networking team

What security pros can learn from the networking team

In truth, your security team has a lot to learn from the networking team about how to keep the whole organization running smoothly. We spoke to networking experts to find out what they most wanted security pros to know.

Just for show: 11 theatrical security measures that don't make your systems safer

Just for show: 11 theatrical security measures that don't make your systems safer

We talked to an array of tech experts to discover what security technologies are often just for show.

Kinder, gentler hacks: A bevy of low-stakes early computer breaches

Kinder, gentler hacks: A bevy of low-stakes early computer breaches

Today, IT security is a deadly serious business. But in the early days of computing, the stakes were a bit lower. Maybe it's just that we're seeing it through a nostalgic lens, but the computer breaches in the '70s, '80s, and '90s...

Keeping your kids safe along with your network

Keeping your kids safe along with your network

Security pros talk about the lessons learned when dealing with kids and computers.

Threat geography: Why certain kinds of cyberattacks come from certain places

Threat geography: Why certain kinds of cyberattacks come from certain places

To understand the threat landscape, you need to know about history, economics, and more.

'Unbreakable' security that wasn't: True tales of tech hubris

'Unbreakable' security that wasn't: True tales of tech hubris

If you think your system is invulnerable, you're fooling yourself, not your opponents.

10 offbeat, odd, and downright weird places you'll find Linux

10 offbeat, odd, and downright weird places you'll find Linux

Why worry about the desktop when you've conquered everything else?

14 strange but true tech facts you (probably) don't know

14 strange but true tech facts you (probably) don't know

But we think you'll be glad to find out!

O Pioneers: 10 enterprise IT firsts

O Pioneers: 10 enterprise IT firsts

Somebody's got to be first, even if it doesn't always work out. Here are the stories behind 10 IT firsts.

Load More