Josh Fruhlinger

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

What is open source software? Open source and FOSS explained

What is open source software? Open source and FOSS explained

We trace the rise of free open source software—code that can be freely modified and shared—from philosophical outlier to modern powerhouse

What is a computer virus? How they spread and 5 signs you've been infected

What is a computer virus? How they spread and 5 signs you've been infected

A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.

What is a service mesh? Service mesh explained

What is a service mesh? Service mesh explained

A service mesh brings security, resiliency, and visibility to service communications, so developers don’t have to

What is serverless? Serverless computing explained

What is serverless? Serverless computing explained

Simple functions in isolation make development easier, while event-driven execution makes operations cheaper

What is a Trojan horse? How this tricky malware works

What is a Trojan horse? How this tricky malware works

A Trojan horse is a type of malware that can wreak havoc on computer networks — but only with your unwitting help.

What is PKI? And how it secures just about everything online

What is PKI? And how it secures just about everything online

Public key infrastructure (PKI) is a catch-all term for everything used to establish and manage public key encryption, one of the most common forms of internet encryption. It is baked into every web browser in use today to secure...

Malware explained: How to prevent, detect and recover from it

Malware explained: How to prevent, detect and recover from it

Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it.

What is OPSEC? A process for protecting critical information

What is OPSEC? A process for protecting critical information

Operations security (OPSEC) is a process by which organizations assess and protect public data about themselves that could, if properly analyzed and grouped with other data by a clever adversary, reveal a bigger picture that ought to...

The 6 biggest ransomware attacks of the last 5 years

The 6 biggest ransomware attacks of the last 5 years

The biggest ransomware attacks illustrate how this particularly nasty genre of attack software has grown from a curiosity and an annoyance to a major crisis.

What is a honeypot? A trap for catching hackers in the act

What is a honeypot? A trap for catching hackers in the act

A honeypot is a system designed to lure hackers into revealing their origins and techniques, and they're used by security researchers and corporate IT alike.

What is Linux? The open-source operating system that's changing the world

What is Linux? The open-source operating system that's changing the world

Linux has long been the basis of commercial networking devices, but now it's a mainstay of enterprise infrastructure.

What is a digital twin and why it's important to IoT

What is a digital twin and why it's important to IoT

Digital twins are virtual replicas of physical devices that data scientists and IT pros can use to run simulations before actual devices are built and deployed. They are also changing how technologies such as IoT, AI and analytics are...

What is digital forensics? And how to land a job in this hot field

What is digital forensics? And how to land a job in this hot field

Digital forensics is the application of scientific investigatory techniques to digital crimes and attacks. Think beyond the awful (and justly cancelled) TV show CSI Cyber; digital forensics is a crucial aspect of law and business in...

What is a CISO? Responsibilities and requirements for this vital leadership role

What is a CISO? Responsibilities and requirements for this vital leadership role

The chief information security officer (CISO) is the executive responsible for an organization's information and data security. Learn what it takes to land a CISO job and how to be successful in the role.

Ransomware explained: How it works and how to remove it

Ransomware explained: How it works and how to remove it

Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment. 

10 toxic traits of bad bosses

10 toxic traits of bad bosses

If you recognize your boss (or even yourself) among these examples — well, at least you're not alone.

What is SSL, TLS? And how this encryption protocol works

What is SSL, TLS? And how this encryption protocol works

The SSL/TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

What is a cyber attack? Recent examples show disturbing trends

What is a cyber attack? Recent examples show disturbing trends

A cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Here are some of the major recent cyber attacks and what we can learn from them.

10 things you should know about dark web websites

10 things you should know about dark web websites

Catch a glimpse of what flourishes in the shadows of the internet.

The OPM hack explained: Bad security practices meet China's Captain America

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.

Load More