Fahmida Y. Rashid

Contributor

Fahmida Y. Rashid is a freelance writer who wrote for CSO and focused on information security. Before joining CSO, she wrote about networking and security for various technology publications, including InfoWorld, eWeek, PC Magazine, Dark Reading, and CRN. She also spent years as an IT administrator, software developer, and data analyst. "I, for one, welcome our new computer overlords."

10 security buzzwords that need to be put to rest

Types of phishing attacks and how to identify them

Types of phishing attacks and how to identify them

Phishing comes in many forms, from spear phishing, whaling and business-email compromise to clone phishing, vishing and snowshoeing. Here's how to recognize each type of phishing attack.

Want stronger passwords? Understand these 4 common password security myths

Want stronger passwords? Understand these 4 common password security myths

Yes, password length and complexity matter, but only if you apply those qualities to the proper security context.

DNSSEC key signing key rollover: Are you ready?

DNSSEC key signing key rollover: Are you ready?

ICANN has postponed the deadline for updating name servers with the new root zone key signing key to early 2018 because too many ISPs and network operators are not ready, and that would cause DNSSEC validations to fail.

Bossie Awards 2017: The best networking and security software

Bossie Awards 2017: The best networking and security software

InfoWorld picks the top open source software for protecting networks and their users

How to overcome tech’s diversity barriers

How to overcome tech’s diversity barriers

Diversity remains a problem in IT. But If you’re a person of color and/or female, the situation is far from hopeless, particularly if you arm yourself with the latest information and advice from your peers.

What is the biggest threat from the Equifax breach? Account takeovers

What is the biggest threat from the Equifax breach? Account takeovers

Cyber criminals have the most to gain by taking ownership of bank, brokerage and retirement accounts using people’s PII. Are traditional authentication systems obsolete?

Amazon Macie automates cloud data protection with machine learning

Amazon Macie automates cloud data protection with machine learning

Amazon promises AWS S3 customers that they will be able to identify and protect sensitive data faster with Macie, but is it enough to catch up to what Microsoft and Google offers?

Malicious code in the Node.js npm registry shakes open source trust model

Malicious code in the Node.js npm registry shakes open source trust model

Bad actors using typo-squatting place 39 malicious packages in npm that went undetected for two weeks. How should the open source community respond?

Why SSL/TLS attacks are on the rise

Why SSL/TLS attacks are on the rise

As more companies adopt better encryption practices, cyber criminals are turning to SSL/TLS vulnerabilities to deliver malicious attacks.

Oracle’s monster update emphasizes flaws in critical business applications

Oracle’s monster update emphasizes flaws in critical business applications

Oracle hasn’t been “just” a database company in a long time, and nowhere is that more evident than in its quarterly critical patch update release, where the bulk of the fixes are in business applications like PeopleSoft and E-Business...

Top cloud security controls you should be using

Top cloud security controls you should be using

Human error is one of the top reasons for data breaches in the cloud, as administrators forget to turn on basic security controls. Whether it is Amazon Web Services, Microsoft Azure, or Google Cloud Platform, keep these rules in mind...

Load More