Jaikumar Vijayan

Jaikumar Vijayan is a freelance technology writer specializing in computer security and privacy topics. Disclosure: He also writes for Hewlett-Packard's marketing website TechBeacon.

Most common SAP vulnerabilities attackers try to exploit

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

Information Sharing and Analysis Organizations were created to make cyber threat data and best practices more accessible than with Information Sharing and Analysis Centers, but results are mixed.

6 questions CISOs should ask if their cybersecurity vendor is acquired

6 questions CISOs should ask if their cybersecurity vendor is acquired

M&A activity in the cybersecurity industry is at record levels, and that could have a negative impact on your investment in tools and platforms.

A Guide to Certificate Lifecycle Management: Benefits and Use Cases

A Guide to Certificate Lifecycle Management: Benefits and Use Cases

Mitigate risks of business disruption and security issues with a modern approach to digital certificate management.

Success in Cybersecurity Requires Interoperability and Openness: Top Reasons Certificate Lifecycle Management Should be CA-Agnostic

Success in Cybersecurity Requires Interoperability and Openness: Top Reasons Certificate Lifecycle Management Should be CA-Agnostic

With an ever-growing volume of digital certificates from both public and private issuing authorities, it’s no longer tenable to manage their lifecycles with traditional methods.

The Growing Challenges of Certificate Lifecycle Management

The Growing Challenges of Certificate Lifecycle Management

Improperly managing your enterprise’s digital certificates can lead to security and operational risks.

4 ways employee home networks and smart devices change your threat model

4 ways employee home networks and smart devices change your threat model

Home routers, printers, security systems, DVRs, gaming consoles and other smart devices can significantly change the threat model for the corporate network.

5 tips for reducing false positive security alerts

5 tips for reducing false positive security alerts

SOC analysts spend too much time and effort chasing security alerts that incorrect indicate a vulnerability where none exists.

Securing the edge: 4 trends to watch

Securing the edge: 4 trends to watch

The global COVID-19 pandemic exacerbated some of the security risks associated with the move to a more distributed computing model. Here are 4 ways security organizations are responding as edge computing threats evolve.

6 ways the pandemic has triggered long-term security changes

6 ways the pandemic has triggered long-term security changes

With some changes prompted by COVID-19 likely to be permanent, enterprises will need to revise their data security strategies.

6 risk factors to know when hiring an MSSP

6 risk factors to know when hiring an MSSP

A managed security services provider can effectively extend an organization's security capabilities or provide affordable security infrastructure if you avoid these common mistakes.

8 biases that will kill your security program

8 biases that will kill your security program

CISOs and their security teams often hold cognitive biases that get in the way of making the right risk management and incident response decisions. Here are eight of the most common to avoid.

Load More