

Jaikumar Vijayan
Jaikumar Vijayan is a freelance technology writer specializing in computer security and privacy topics. Disclosure: He also writes for Hewlett-Packard's marketing website TechBeacon.

5 best practices for negotiating SaaS contracts for risk and security
Software-as-a-service providers often handle your sensitive data. Here's how to hold them to a high standard for security.

Content fraud takes a bite out of brand reputation
Scammers leverage user-generated content on trusted sites to trick consumers into sharing sensitive data, causing financial and reputational harm to those businesses.

How drones affect your threat model
As use of unmanned aerial vehicles grows, organizations should have a plan for managing the risk associated with drones, whether or not they deploy them, experts say.

4 ways employee home networks and smart devices change your threat model
Home routers, printers, security systems, DVRs, gaming consoles and other smart devices can significantly change the threat model for the corporate network.

Redefining the CISO role: Why the top security job is gaining C-suite and boardroom status
Breach concerns, data privacy regulations, and a move to separate security from IT are elevating the importance of the security role.

4 ways edge computing changes your threat model
Edge computing provides more opportunities for attackers to access devices--and your network--remotely and physically. These are the risks you need to consider.

How IoT changes your threat model: 4 key considerations
More IoT devices connected to your network increases your attack surface, lowers visibility to potential threats, and requires greater coordination between IT and OT.

4 ways 5G will change your enterprise threat model
The benefits that fifth-generation cellular networks will enable come with security risks that organizations need to pay attention to right now.

Flex streamlines app access for 20k suppliers with IAM overhaul
Contract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property.

6 risk factors to know when hiring an MSSP
A managed security services provider can effectively extend an organization's security capabilities or provide affordable security infrastructure if you avoid these common mistakes.
