Josh Fruhlinger

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

5 top trends in endpoint security for 2018

What is FedRAMP? How cloud providers get authorized to work with the U.S. government

What is FedRAMP? How cloud providers get authorized to work with the U.S. government

The process for getting the FedRAMP seal of approval is complex, but it can ultimately be lucrative for companies that meet the security requirements.

The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet

The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet

Mirai took advantage of insecure IoT devices in a simple but clever way. It scanned big blocks of the internet for open Telnet ports, then attempted to log in default passwords. In this way, it was able to amass a botnet army.

What is a cyber attack? Recent examples show disturbing trends

What is a cyber attack? Recent examples show disturbing trends

From virtual bank heists to semi-open attacks from nation-states, the last couple of years has been rough on IT security. Here are some of the major cyber attacks of 2017-2018 and what we can learn from them.

Spectre and Meltdown explained: What they are, how they work, what's at risk

Spectre and Meltdown explained: What they are, how they work, what's at risk

Spectre and Meltdown are the names given to a trio of variations on a vulnerability that affects nearly every computer chip manufactured in the last 20 years. The flaws are so fundamental and widespread that security researchers are...

What is SSL/TLS? (And why it’s time to upgrade to TLS 1.3)

What is SSL/TLS? (And why it’s time to upgrade to TLS 1.3)

The TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

How much do CIOs really make? Pay packages of 25 Fortune 500 execs revealed

How much do CIOs really make? Pay packages of 25 Fortune 500 execs revealed

CIO salaries are nothing to sneeze at, but they don't tell the whole compensation story. Here's a look at how bonuses, stock awards, perks and other compensation add up.

What is ransomware? How it works and how to remove it

What is ransomware? How it works and how to remove it

Ransomware is a form of malicious software (or malware) that, once it's taken over your computer, threatens you with harm, usually by denying you access to your data. The attacker demands a ransom from the victim, promising — not...

Beware these 4 types of IRS scams

Beware these 4 types of IRS scams

From fake IRS phone calls to W-2 phishing. Here's what you need to know about the different types of IRS scams and how to protect yourself.

Tech's worst layoffs, 2017

Tech's worst layoffs, 2017

A look back at the year in pink slips

Information security, 2018: What we have here is a failure to plan

Information security, 2018: What we have here is a failure to plan

Information security increasingly has a place in corporate leadership, but plenty of companies are still failing to make the plans they need to keep up.

Petya ransomware and NotPetya malware: What you need to know now

Petya ransomware and NotPetya malware: What you need to know now

NotPetya superficially resembles the Petya ransomware in several ways, but there are a number of important ways in which it's different, and much more dangerous.

Load More