Josh Fruhlinger

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

What are microservices? Your next software architecture

15 famous ERP disasters, dustups and disappointments

15 famous ERP disasters, dustups and disappointments

It's no wonder ERP has such a bad reputation: The history surrounding the complex and expensive enterprise software market is packed with tales of vendor mud-slinging, outrageous hype and epic failures.

Marriott data breach FAQ: How did it happen and what was the impact?

Marriott data breach FAQ: How did it happen and what was the impact?

In late 2018, the Marriott hotel chain announced that one of its reservation systems had been compromised, with hundreds of millions of customer records, including credit card and passport numbers, being exfiltrated by the attackers....

What is JavaScript? The full stack programming language

What is JavaScript? The full stack programming language

The most popular programming language in the world started out in the browser but now runs everywhere

Social engineering explained: How criminals exploit human behavior

Social engineering explained: How criminals exploit human behavior

Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems or data.

What is OAuth? How the open authorization framework works

What is OAuth? How the open authorization framework works

OAuth is an open-standard authorization protocol or framework that describes how unrelated servers and services can safely allow authenticated access to their assets. It is widely accepted, but be aware of its vulnerabilities.

2fa explained: How to enable it and how it works

2fa explained: How to enable it and how it works

Two-factor authentication (2fa) is a method of establishing access to an online account or computer system that requires the user to provide two different types of information. It can boost security for anyone using any kind of online...

What is phishing? How this cyber attack works and how to prevent it

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

What is a computer worm? How this self-spreading malware wreaks havoc

What is a computer worm? How this self-spreading malware wreaks havoc

A worm is a form of malware (malicious software) that operates as a self-contained application and can transfer and copy itself from computer to computer.

What is open source software? Open source and FOSS explained

What is open source software? Open source and FOSS explained

We trace the rise of free open source software—code that can be freely modified and shared—from philosophical outlier to modern powerhouse

What is a computer virus? How they spread and 5 signs you've been infected

What is a computer virus? How they spread and 5 signs you've been infected

A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.

What is a service mesh? Service mesh explained

What is a service mesh? Service mesh explained

A service mesh brings security, resiliency, and visibility to service communications, so developers don’t have to

Load More