Josh Fruhlinger

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

Ransomware explained: How it works and how to remove it

Whitelisting explained: How it works and where it fits in a security program

Whitelisting explained: How it works and where it fits in a security program

Whitelisting is a cybersecurity strategy under which a user can only take actions on their computer that an administrator has explicitly allowed in advance. It is a fairly extreme measure with high administrative overhead, but it...

What is pretexting? Definition, examples and prevention

What is pretexting? Definition, examples and prevention

Pretexting is form of social engineering in which an attacker comes up with a story to convince a victim to give up valuable information or access to a service or system.

What is PKI? And how it secures just about everything online

What is PKI? And how it secures just about everything online

Public key infrastructure (PKI) is a catch-all term for everything used to establish and manage public key encryption, one of the most common forms of internet encryption. It is baked into every web browser in use today to secure...

Vishing explained: How voice phishing attacks scam victims

Vishing explained: How voice phishing attacks scam victims

Vishing (voice phishing) is a form of attack that attempts to trick victims into giving up sensitive personal information over the phone.

What is IoT? The internet of things explained

What is IoT? The internet of things explained

The internet of things (IoT) is a network of connected smart devices providing rich data, but it can also be a security nightmare.

SOC analyst job description, salary, and certification

SOC analyst job description, salary, and certification

A SOC analyst is a cybersecurity professional who works as part of a team to monitor and fight threats to an organization's IT infrastructure, and to assess security systems and measures for weaknesses and possible improvements.

Threat modeling explained: A process for anticipating cyber attacks

Threat modeling explained: A process for anticipating cyber attacks

Threat modeling is a structured process through which IT pros can identify potential security threats and vulnerabilities, quantify the seriousness of each, and prioritize techniques to mitigate attack and protect IT resources.

What is phishing? How this cyber attack works and how to prevent it

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

High-performance computing as a service: What you need to know

High-performance computing as a service: What you need to know

HPC services can be a way to meet expanding supercomputing needs, but depending on the use case, they’re not necessarily better than on-premises supercomputers.

16 famous ERP disasters, dustups and disappointments

16 famous ERP disasters, dustups and disappointments

It's no wonder ERP has such a bad reputation: The history surrounding the complex and expensive enterprise software market is packed with tales of vendor mud-slinging, outrageous hype and epic failures.

What is a cyber attack? Recent examples show disturbing trends

What is a cyber attack? Recent examples show disturbing trends

A cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Here are some of the major recent cyber attacks and what we can learn from them.

Load More