Josh Fruhlinger

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

What is cybersecurity? Definition, frameworks, jobs, and salaries

What is phishing? How this cyber attack works and how to prevent it

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

What is the .NET Framework? Microsoft’s answer to Java

What is the .NET Framework? Microsoft’s answer to Java

Once limited to Windows, .NET also now allows developers to easily build apps for Linux, MacOS, and Android

How EDR stops hackers in their tracks

How EDR stops hackers in their tracks

EDR is a category of security tools that monitor end-user hardware devices across a network for a range of suspicious activities and behavior, reacting automatically to block perceived threats and saving forensic data for further...

What is business intelligence? Transforming data into business insights

What is business intelligence? Transforming data into business insights

Business intelligence (BI) leverages software and services to transform data into actionable insights that inform an organization’s business decisions.

Beamforming explained: How it makes wireless communication faster

Beamforming explained: How it makes wireless communication faster

Beamforming uses the science of electromagnetic interference to make Wi-Fi and 5G connections more precise.

Equifax data breach FAQ: What happened, who was affected, what was the impact?

Equifax data breach FAQ: What happened, who was affected, what was the impact?

In 2017, personally identifying data of hundreds of millions of people was stolen from credit reporting agency Equifax. Here's a timeline of what happened, how it happened, and the impact.

What are microservices? Your next software architecture

What are microservices? Your next software architecture

Microservices break up monolithic code into easy-to-maintain chunks and are key to the devops philosophy

15 famous ERP disasters, dustups and disappointments

15 famous ERP disasters, dustups and disappointments

It's no wonder ERP has such a bad reputation: The history surrounding the complex and expensive enterprise software market is packed with tales of vendor mud-slinging, outrageous hype and epic failures.

Marriott data breach FAQ: How did it happen and what was the impact?

Marriott data breach FAQ: How did it happen and what was the impact?

In late 2018, the Marriott hotel chain announced that one of its reservation systems had been compromised, with hundreds of millions of customer records, including credit card and passport numbers, being exfiltrated by the attackers....

What is JavaScript? The full stack programming language

What is JavaScript? The full stack programming language

The most popular programming language in the world started out in the browser but now runs everywhere

Social engineering explained: How criminals exploit human behavior

Social engineering explained: How criminals exploit human behavior

Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems or data.

Load More