J.M. Porup

Senior Writer

J.M. Porup has been a security geek since 2002, when he got his first job in IT. Since then he's covered national security and information security for a variety of publications, and now calls CSOonline home. He previously reported from Colombia for four years, where he wrote travel guidebooks to Latin America, and speaks Spanish fluently with a hilarious gringo-Colombian accent.

Information security in a war zone: How the Red Cross protects its data

What is Shodan? The search engine for everything on the internet

What is Shodan? The search engine for everything on the internet

Defenders find this simple tool valuable for finding vulnerable devices attached to the web that need to be secured.

Scapegoating security researchers harms society

Scapegoating security researchers harms society

Want your government to stop punishing the security community for its own lapses? Become a better teacher and advocate for what you do.

GreyNoise: Knowing the difference between benign and malicious internet scans

GreyNoise: Knowing the difference between benign and malicious internet scans

Used with Shodan, this "search engine that looks at people scanning the internet" can help you pick bad actors out of the noise.

Katie Moussouris: It’s dangerous to conflate bug bounties and vulnerability disclosure

Katie Moussouris: It’s dangerous to conflate bug bounties and vulnerability disclosure

“There are two extremes right now: no idea where to start or do a bug bounty,” says Moussouris, who built Microsoft's vulnerability disclosure program.

Georgia governor vetoes bill that would criminalize good-faith security research, permit vigilante action

Georgia governor vetoes bill that would criminalize good-faith security research, permit vigilante action

Veto comes in response to overwhelming criticism from industry. Georgia cybersecurity folks had been outraged about SB 315, and warned that it could cost the state jobs.

Online voting is impossible to secure. So why are some governments using it?

Online voting is impossible to secure. So why are some governments using it?

If you thought electronic voting machines were insecure, wait 'til you meet online voting. Dr. Vanessa Teague has twice demonstrated massive security flaws in online voting systems. Instead of fixes and support, she got official...

What is cross-site scripting (XSS)? Low-hanging fruit for both attackers and defenders

What is cross-site scripting (XSS)? Low-hanging fruit for both attackers and defenders

With XSS, attackers enter malicious code into a web form or web app URL to trick the application into doing something it's not supposed to do.

Voting machine vendor firewall config, passwords posted on public support forum

Voting machine vendor firewall config, passwords posted on public support forum

"This is gold" for a nation-state attacker that wanted to hack an election.

Want to hack a voting machine? Hack the voting machine vendor first

Want to hack a voting machine? Hack the voting machine vendor first

How password reuse and third-party breaches leave voting machine vendors vulnerable to attack.

1.4B stolen passwords are free for the taking: What we know now

1.4B stolen passwords are free for the taking: What we know now

The 2012 LinkedIn breach, along with other old third-party breaches, is still paying dividends for criminals, who now have free access to 1.4 billion previously exposed email addresses and passwords.

8 security tools and tips for journalists

8 security tools and tips for journalists

Journalists have a giant red target on their backs. How can we defend ourselves?

Load More