Josh Fruhlinger

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

What is Linux? The open-source operating system that's changing the world

What is Linux? The open-source operating system that's changing the world

Linux has long been the basis of commercial networking devices, but now it's a mainstay of enterprise infrastructure.

What is a digital twin? [And how it’s changing IoT, AI and more]

What is a digital twin? [And how it’s changing IoT, AI and more]

Digital twins are virtual replicas of physical devices that data scientists and IT pros can use to run simulations before actual devices are built and deployed. They are also changing how technologies such as IoT, AI and analytics are...

What is digital forensics? And how to land a job in this hot field

What is digital forensics? And how to land a job in this hot field

Digital forensics is the application of scientific investigatory techniques to digital crimes and attacks. Think beyond the awful (and justly cancelled) TV show CSI Cyber; digital forensics is a crucial aspect of law and business in...

What is a CISO? Responsibilities and requirements for this vital leadership role

What is a CISO? Responsibilities and requirements for this vital leadership role

The chief information security officer (CISO) is the executive responsible for an organization's information and data security. Learn what it takes to land a CISO job and how to be successful in the role.

What is ransomware? 4 steps to prevent these file-locking attacks

What is ransomware? 4 steps to prevent these file-locking attacks

Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment. 

10 toxic traits of bad bosses

10 toxic traits of bad bosses

If you recognize your boss (or even yourself) among these examples — well, at least you're not alone.

What is SSL, TLS? And how this encryption protocol works

What is SSL, TLS? And how this encryption protocol works

The SSL/TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

What is a cyber attack? Recent examples show disturbing trends

What is a cyber attack? Recent examples show disturbing trends

A cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Here are some of the major recent cyber attacks and what we can learn from them.

10 things you should know about dark web websites

10 things you should know about dark web websites

Catch a glimpse of what flourishes in the shadows of the internet.

The OPM hack explained: Bad security practices meet China's Captain America

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.

9 chiefs you don't need in the C-suite

9 chiefs you don't need in the C-suite

What's in a title? Sometimes surprisingly little, it turns out.

Leadership lessons from Linus Torvalds: 7 dos and 3 don'ts

Leadership lessons from Linus Torvalds: 7 dos and 3 don'ts

You don't have to take a page out of his book to learn some valuable lessons from how Torvalds has managed the sprawling, self-selected, volunteer community of Linux developers—both the successes, and what led to his self-imposed...

How much do CIOs really make? Pay packages of 25 Fortune 500 execs revealed

How much do CIOs really make? Pay packages of 25 Fortune 500 execs revealed

A CIO's salary is nothing to sneeze at, but salary alone doesn't tell the whole compensation story. Here's a look at how bonuses, stock awards, perks and other compensation add up.

What is WannaCry ransomware, how does it infect, and who was responsible?

What is WannaCry ransomware, how does it infect, and who was responsible?

Stolen government hacking tools, unpatched Windows systems, and shadowy North Korean operatives made WannaCry a perfect ransomware storm.

What is network security? Definition, methods, jobs & salaries

What is network security? Definition, methods, jobs & salaries

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead...

What is corporate espionage? Inside the murky world of private spying

What is corporate espionage? Inside the murky world of private spying

Companies gather intelligence on their rivals just like nation-states do. Sometimes its legal, but industrial espionage can easily slip over the line into criminality.

Martech spending in 2018: What CIOs need to know

Martech spending in 2018: What CIOs need to know

From CRM and business intelligence to chatbots and automation, marketers have spending plans across the marketing tech stack.

How to lead a virtual team: 5 keys for success

How to lead a virtual team: 5 keys for success

You've got the tools, you've navigated the logistical hurdles, but you still may not be leading your remote team in the most effective way possible. Here's how to get virtual teams right.

The state of IT security, 2018

The state of IT security, 2018

Who's in charge of IT security? To whom do they report? How big is their budget? We've got answers.

5 top trends in endpoint security for 2018

5 top trends in endpoint security for 2018

Endpoint security is a rapidly developing category, as organizations look to coordinate control of the PCs, servers and phones on their networks to keep out malware and intruders. Let's look at what the year ahead has in store.

Load More