Josh Fruhlinger is a writer and editor who lives in Los Angeles.
The CIA (confidentiality, integrity, availability) triad is a widely used information security model that can guide an organization’s efforts and policies aimed at keeping its data secure — but tradeoffs are necessary in real-world scenarios.
Swatting is a form of criminal harassment in which attackers “prank call” law enforcement to trick police into surrounding unsuspecting homes — and the resulting confrontations can go very badly.
The Certified Cloud Security Professional (CCSP) is a cloud-focused security credential that can advance your career as a cybersecurity pro. Here are the details you need to know.
Certified Ethical Hacker (CEH) is an early-career certification for security pros interested in assessing target systems using techniques often associated with hackers to help identify vulnerabilities for employers or clients. Learn how it will impac
Whitelisting locks down computers so only approved applications can run. Is the security worth the administrative hassle?
While it may seem counterintuitive to entrust security to a single password manager app accessed by a single password, using a password manager is in fact a very good idea. Here’s what you need to know to choose a password manager for your busi
Certified Information Security Manager (CISM) is a certification for advanced IT professionals who want to demonstrate that they can develop and manage an infosec program at the enterprise level.
Two-factor authentication (2FA) goes beyond passwords to add a second layer of security to the authentication process. Organizations and users alike can better secure their data by making the shift to 2FA.
Sponsored Links