Jaikumar Vijayan

Jaikumar Vijayan is a freelance technology writer specializing in computer security and privacy topics. Disclosure: He also writes for Hewlett-Packard's marketing website TechBeacon.

4 ways employee home networks and smart devices change your threat model

5 tips for reducing false positive security alerts

5 tips for reducing false positive security alerts

SOC analysts spend too much time and effort chasing security alerts that incorrect indicate a vulnerability where none exists.

Securing the edge: 4 trends to watch

Securing the edge: 4 trends to watch

The global COVID-19 pandemic exacerbated some of the security risks associated with the move to a more distributed computing model. Here are 4 ways security organizations are responding as edge computing threats evolve.

6 ways the pandemic has triggered long-term security changes

6 ways the pandemic has triggered long-term security changes

With some changes prompted by COVID-19 likely to be permanent, enterprises will need to revise their data security strategies.

6 risk factors to know when hiring an MSSP

6 risk factors to know when hiring an MSSP

A managed security services provider can effectively extend an organization's security capabilities or provide affordable security infrastructure if you avoid these common mistakes.

8 biases that will kill your security program

8 biases that will kill your security program

CISOs and their security teams often hold cognitive biases that get in the way of making the right risk management and incident response decisions. Here are eight of the most common to avoid.

5 biggest healthcare security threats for 2021

5 biggest healthcare security threats for 2021

Healthcare organizations can expect ransomware, botnets, cloud misconfigurations, web application attacks, and phishing to be their top risks.

6 tips for receiving and responding to third-party security disclosures

6 tips for receiving and responding to third-party security disclosures

Your first notification of your next breach or significant threat might come from outside your organization. Have these preparations in place to effectively and quickly respond to inbound security intelligence.

5 reasons why the cost of ransomware attacks is rising

5 reasons why the cost of ransomware attacks is rising

The ransom is still a tiny portion of the total cost of a ransomware attack, but associated costs are increasing.

5 ways to combat audit fatigue

5 ways to combat audit fatigue

The growing number of audits for security and privacy regulatory compliance is stressing security personnel and draining resources from security operations. Here's how to better manage them.

6 board of directors security concerns every CISO should be prepared to address

6 board of directors security concerns every CISO should be prepared to address

The COVID pandemic and spike in cybercriminal activity has raised interest in security among corporate boards. These are the concerns and questions CISOs say they are now hearing from them.

5 best practices for negotiating SaaS contracts for risk and security

5 best practices for negotiating SaaS contracts for risk and security

Software-as-a-service providers often handle your sensitive data. Here's how to hold them to a high standard for security.

Load More