Josh Fruhlinger

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

What is malware? Viruses, worms, trojans, and beyond

What is network security? Definition, methods, jobs & salaries

What is network security? Definition, methods, jobs & salaries

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead...

What is corporate espionage? Inside the murky world of private spying

What is corporate espionage? Inside the murky world of private spying

Companies gather intelligence on their rivals just like nation-states do. Sometimes its legal, but industrial espionage can easily slip over the line into criminality.

Martech spending in 2018: What CIOs need to know

Martech spending in 2018: What CIOs need to know

From CRM and business intelligence to chatbots and automation, marketers have spending plans across the marketing tech stack.

How to lead a virtual team: 5 keys for success

How to lead a virtual team: 5 keys for success

You've got the tools, you've navigated the logistical hurdles, but you still may not be leading your remote team in the most effective way possible. Here's how to get virtual teams right.

The state of IT security, 2018

The state of IT security, 2018

Who's in charge of IT security? To whom do they report? How big is their budget? We've got answers.

5 top trends in endpoint security for 2018

5 top trends in endpoint security for 2018

Endpoint security is a rapidly developing category, as organizations look to coordinate control of the PCs, servers and phones on their networks to keep out malware and intruders. Let's look at what the year ahead has in store.

5 top trends in endpoint security for 2018

5 top trends in endpoint security for 2018

Endpoint security is focused on locking down endpoints — individual computers, phones, tablets and other network-enabled devices — in order to keep networks safe. Of course, as threats evolve, endpoint security suites must evolve as...

What is FedRAMP? How cloud providers get authorized to work with the U.S. government

What is FedRAMP? How cloud providers get authorized to work with the U.S. government

The process for getting the FedRAMP seal of approval is complex, but it can ultimately be lucrative for companies that meet the security requirements.

The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet

The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet

Mirai took advantage of insecure IoT devices in a simple but clever way. It scanned big blocks of the internet for open Telnet ports, then attempted to log in default passwords. In this way, it was able to amass a botnet army.

What is a cyber attack? Recent examples show disturbing trends

What is a cyber attack? Recent examples show disturbing trends

From virtual bank heists to semi-open attacks from nation-states, the last couple of years has been rough on IT security. Here are some of the major cyber attacks of 2017-2018 and what we can learn from them.

Spectre and Meltdown explained: What they are, how they work, what's at risk

Spectre and Meltdown explained: What they are, how they work, what's at risk

Spectre and Meltdown are the names given to a trio of variations on a vulnerability that affects nearly every computer chip manufactured in the last 20 years. The flaws are so fundamental and widespread that security researchers are...

Load More