J.M. Porup

Senior Writer

J.M. Porup got his start in security working as a Linux sysadmin in 2002. Since then he's covered national security and information security for a variety of publications, and now calls CSO Online home. He previously reported from Colombia for four years, where he wrote travel guidebooks to Latin America, and speaks Spanish fluently with a hilarious gringo-Colombian accent. He holds a Masters degree in Information and Cybersecurity (MICS) from UC Berkeley.

What is the Tor Browser? And how it can help protect your identity

What is the Tor Browser? And how it can help protect your identity

The Tor Browser is a web broswer that anonymizes your web traffic using the Tor network, making it easy to protect your identity online.

Presidential campaign websites fail at privacy, new study shows

Presidential campaign websites fail at privacy, new study shows

A non-partisan analysis of 23 presidential campaign websites reveals glaring privacy issues.

5 OT security takeaways CISOs need to communicate to stakeholders

5 OT security takeaways CISOs need to communicate to stakeholders

Operational technology security requires a different approach than IT security. Here are key takeaways CSOs need to communicate to other executives and boards of directors.

Speaker disinvites at CyberCon spark controversy

Speaker disinvites at CyberCon spark controversy

NSA whistleblower Thomas Drake and Australian academic Dr. Suelette Dreyfus disinvited from speaking at CyberCon a week before the conference.

Voting machine security: What to look for and what to look out for

Voting machine security: What to look for and what to look out for

The US Senate approved $250 million to help states purchase more secure voting equipment — but includes no provisions for what "secure" means. Our buying guide will help state election officials spend taxpayer money wisely.

5 top cybersecurity masters degrees: Which is right for you?

5 top cybersecurity masters degrees: Which is right for you?

New cyber masters degrees are popping up all over the place. Here's our unscientific rundown of the top five.

6 questions candidates should ask at every security job interview

6 questions candidates should ask at every security job interview

The cybersecurity skills shortage means security pros can be picky about where they work. Here's how to suss out bad employers.

IoT vendors ignore basic security best practices, CITL research finds

IoT vendors ignore basic security best practices, CITL research finds

New measurements by the CITL mass fuzzing project show just how bad things really are--and how IoT device makers could radically increase binary security with one day of engineering work.

ICS as a cloud service is coming: Will the benefits outweigh the risks?

ICS as a cloud service is coming: Will the benefits outweigh the risks?

Plugging industrial control and operational technology equipment into cloud-based monitoring and remote management systems increases visibility, but it also takes away their security by obscurity.

Improving BGP routing security by minding your MANRS

Improving BGP routing security by minding your MANRS

Enterprises can improve their routing security for modest costs, according to the Mutually Agreed Norms for Routing Security (MANRS) project.

The best and worst of Black Hat 2019

The best and worst of Black Hat 2019

Security rock stars? Fake science? This year's Black Hat had it all.

Black Hat keynote: Why security culture needs to change

Black Hat keynote: Why security culture needs to change

Dino Dai Zovi tells Black Hat audience to embrace a culture where security is everyone's job and risks are shared. Automation with feedback loops also key to solving security challenges at scale

Inside the 2014 hack of a Saudi embassy

Inside the 2014 hack of a Saudi embassy

According to documents seen by CSO, an unknown attacker took control of the official email account of the Saudi embassy in The Netherlands and demanded a ransom of $50 million for ISIS.

7 must-see talks at Black Hat and DEF CON 2019

7 must-see talks at Black Hat and DEF CON 2019

Information security is fundamentally political. It's refreshing to see so many talks this year that merge policy and technology.

What is a zero day? A powerful but fragile weapon

What is a zero day? A powerful but fragile weapon

A zero day is a security flaw that has not yet been patched by the vendor and can be exploited. These vulnerabilities fetch high prices on the black market

11 top DEF CON and Black Hat talks of all time

11 top DEF CON and Black Hat talks of all time

Hacker summer camp in Vegas is almost upon us again. Here are some of the best talks of all time. Will this year's talks measure up to these legends?

Why getting election security right for 2020 matters

Why getting election security right for 2020 matters

The U.S. is moving at glacial speed to secure election systems against possible interference by foreign adversaries. We're not even close to ready, and that could call contests into question.

Secure elections scorecard: Grading the candidate and Congressional proposals

Secure elections scorecard: Grading the candidate and Congressional proposals

After 2016's election security debacle, there's a push to secure America's electronic voting infrastructure. Some of the proposals are good. Others fall short. CSO investigates.

Safely deploying TLS certificates: 5 common mistakes to avoid

Safely deploying TLS certificates: 5 common mistakes to avoid

A properly configured TLS cert is the first layer of defense for data in transit. Here are some tips to ensure a secure deployment.

6 questions to ask before buying an ICS / OT security monitoring tool

6 questions to ask before buying an ICS / OT security monitoring tool

Shopping for an ICS / OT monitoring solution? Here's what you need to know about evaluating the vendors.

Load More