Jaikumar Vijayan

Jaikumar Vijayan is a freelance technology writer specializing in computer security and privacy topics. Disclosure: He also writes for Hewlett-Packard's marketing website TechBeacon.

5 steps to create a zero trust security model

What is an RDP attack? 7 tips for mitigating your exposure

What is an RDP attack? 7 tips for mitigating your exposure

Microsoft's Remote Desktop Protocol has become a popular attack vector. Here's what you need to know about the threat.

What it takes to build a zero trust network

What it takes to build a zero trust network

Zero trust networks offer better protection against data breaches, but the road to them can be arduous.

What does a ransomware attack cost? Beware the hidden expenses

What does a ransomware attack cost? Beware the hidden expenses

The ransom is only a tiny portion of the total cost of a ransomware attack. Consider these associated costs when estimating the total damage.

8 questions to ask about your industrial control systems security

8 questions to ask about your industrial control systems security

Do you have a real cybersecurity-focused ICS strategy in place, or are you force-fitting IT security policies on your industrial control systems?

7 threat modeling mistakes you’re probably making

7 threat modeling mistakes you’re probably making

The relative lack of maturity around threat modeling can cause big problems for organizations seeking to adopt the practice to bolster their network and services security.

IRS makes tax refund scams harder but W-2 phishing attacks continue unabated

IRS makes tax refund scams harder but W-2 phishing attacks continue unabated

Anti-fraud measures by the Internal Revenue Service (IRS) and state agencies over the past two years have made tax refund scams harder for cyber criminals to pull off even as attacks targeting taxpayer information continue unabated.

Tips for negotiating with cyber extortionists

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need to have a plan for negotiating with people who take their data hostage.

5 tips for better enterprise security

5 tips for better enterprise security

Do your security policies and procedures actually promote better security, or is your company only looking for known malware and ignoring the human factor? It’s a tricky balancing act that trips up many organizations.

5 things you should know about cyber insurance

5 things you should know about cyber insurance

As more companies step in to offer insurance coverage against a broad range of cyber losses, we break down five points that organizations should keep in mind as they consider their options.

Tech groups press Congress to pass USA Freedom Act

Tech groups press Congress to pass USA Freedom Act

As Congress returned from summer recess Monday, several technology and civil rights groups quickly renewed their push for a bill that seeks to put curbs on the bulk collection of phone records and Internet data by the government.

Home Depot breach could be as big as Target's

Home Depot breach could be as big as Target's

In what could turn out to be another huge data breach, Home Depot on Tuesday confirmed that it is investigating a potential compromise of credit card and debit card data belonging to an unspecified number of customers.

Load More