Josh Fruhlinger, CIO.com

Josh Fruhlinger

CIO.com

Los Angeles, CA, United States

Contact Josh

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • CIO.com
  • CSOonline
  • Network World
  • InfoWorld
  • Paste Magazine
  • PCWorld
  • ITworld
  • The Awl

Past articles by Josh:

12 famous ERP disasters, dustups and disappointments

It's no wonder ERP has such a bad reputation: The history surrounding the complex and expensive enterprise software market is packed with tales of vendor mudslinging, outrageous hype and epic failures. → Read More

How to hire the right product manager for your IT needs

A broad mix of skills is necessary for this newly vital IT role. Here’s how to home in on the best candidates to help lead your organization’s shift to cross-functional, product-based IT. → Read More

Skills and traits of elite product managers

Product management is an increasingly lucrative career path. Do you have what it takes to fill the bill? → Read More

The Heartbleed bug: How a flaw in OpenSSL caused a security crisis

Heartbleed is a vulnerability in OpenSSL that came to light in April of 2014; it can be traced to a single line of code. → Read More

WannaCry explained: A perfect ransomware storm

WannaCry is a virulent ransomware attack that was designed by a North Korean hacker gang and takes advantage of a Windows vulnerability that remains unpatched on too many computers. → Read More

WannaCry explained: A perfect ransomware storm

WannaCry is a virulent ransomware attack that was designed by a North Korean hacker gang and takes advantage of a Windows vulnerability that remains unpatched on too many computers. → Read More

Defense in depth explained: Layering tools and processes for better security

Defense in depth is a security strategy in which multiple security tools, mechanisms, and policies are deployed in tandem on the assumption that if one fails, another will hold. → Read More

11 infamous malware attacks: The first and the worst

Whether by dumb luck or ruthless skill, these malware attacks left their mark on the internet. → Read More

What is MPLS, and why isn't it dead yet?

Multi-protocol label switching is reliable but expensive, leading enterprises to supplement it with cheaper and more flexible SD-WAN. → Read More

Protecting PII: Examples, laws, and standards

Personally identifiable information (PII), is any piece of data that could be used—either alone or when combined with other data—to identify an individual. Some types of PII are obvious, such as a name or Social Security number, but others are more subtle. → Read More

The 7 best password managers for business

A password manager stores a user’s passwords and logins for various sites and apps and generates new, strong passwords, making it a valuable tool for implementing strong passwords in your business. → Read More

How IPsec works, it’s components and purpose

IPsec (Internet Protocol Security) is a suite of protocols that are used to secure internet communications. It is a common element of VPNs. → Read More

Penetration testing explained: How ethical hackers simulate attacks

Penetration testing is a means of evaluating the security of a network or computer system by attempting to break into it. It is an exercise undertaken by professional pen testers (aka ethical hackers) with the permission of the system’s owners. → Read More

Cheap and free cybersecurity training: 8 ways to build skills without breaking the bank

Whether you're finding bargains online or taking advantage of your own internal resources, you can keep your team up-to-date without writing a big check. → Read More

SAML explained: How this open standard enables single sign on

Security Assertion Markup Language (SAML) is a standard that defines how providers can offer both authentication and authorization services. Here's what you need to know. → Read More

The CSO role today: Responsibilities and requirements for the top security job

The CSO is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk. → Read More

What is SOAR? And 5 tips for getting started with security automation

Security orchestration, automation, and response (SOAR) platforms coordinate information produced by a wide range of security tools and automate much of their analysis and protective responses. → Read More

What is a CISO? Responsibilities and requirements for this vital leadership role

The chief information security officer (CISO) is the executive responsible for an organization's information and data security. Learn what it takes to land a CISO job and how to be successful in the role. → Read More

The HITECH Act explained: Definition, compliance, and violations

The Health Information Technology for Economic and Clinical Health (HITECH) Act aims to expand the use of electronic health records through incentives to health care providers and consumers. It also tightens rules on providers to ensure that EHRs remain private and secure. → Read More

FIDO explained: How this industry initiative aims to make passwords obsolete

The FIDO Alliance is an industry association that promotes the use of public-key cryptography to bring strong authentication to the Web. → Read More