Josh Fruhlinger

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

Leadership lessons from Linus Torvalds: 7 dos and 3 don'ts

How much do CIOs really make? Pay packages of 25 Fortune 500 execs revealed

How much do CIOs really make? Pay packages of 25 Fortune 500 execs revealed

A CIO's salary is nothing to sneeze at, but salary alone doesn't tell the whole compensation story. Here's a look at how bonuses, stock awards, perks and other compensation add up.

What is WannaCry ransomware, how does it infect, and who was responsible?

What is WannaCry ransomware, how does it infect, and who was responsible?

Stolen government hacking tools, unpatched Windows systems, and shadowy North Korean operatives made WannaCry a perfect ransomware storm.

What is malware? Viruses, worms, trojans, and beyond

What is malware? Viruses, worms, trojans, and beyond

Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use it to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it.

What is network security? Definition, methods, jobs & salaries

What is network security? Definition, methods, jobs & salaries

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead...

What is corporate espionage? Inside the murky world of private spying

What is corporate espionage? Inside the murky world of private spying

Companies gather intelligence on their rivals just like nation-states do. Sometimes its legal, but industrial espionage can easily slip over the line into criminality.

Martech spending in 2018: What CIOs need to know

Martech spending in 2018: What CIOs need to know

From CRM and business intelligence to chatbots and automation, marketers have spending plans across the marketing tech stack.

How to lead a virtual team: 5 keys for success

How to lead a virtual team: 5 keys for success

You've got the tools, you've navigated the logistical hurdles, but you still may not be leading your remote team in the most effective way possible. Here's how to get virtual teams right.

The state of IT security, 2018

The state of IT security, 2018

Who's in charge of IT security? To whom do they report? How big is their budget? We've got answers.

5 top trends in endpoint security for 2018

5 top trends in endpoint security for 2018

Endpoint security is a rapidly developing category, as organizations look to coordinate control of the PCs, servers and phones on their networks to keep out malware and intruders. Let's look at what the year ahead has in store.

5 top trends in endpoint security for 2018

5 top trends in endpoint security for 2018

Endpoint security is focused on locking down endpoints — individual computers, phones, tablets and other network-enabled devices — in order to keep networks safe. Of course, as threats evolve, endpoint security suites must evolve as...

What is FedRAMP? How cloud providers get authorized to work with the U.S. government

What is FedRAMP? How cloud providers get authorized to work with the U.S. government

The process for getting the FedRAMP seal of approval is complex, but it can ultimately be lucrative for companies that meet the security requirements.

Load More