

Jaikumar Vijayan
Jaikumar Vijayan is a freelance technology writer specializing in computer security and privacy topics. Disclosure: He also writes for Hewlett-Packard's marketing website TechBeacon.


5 ways to combat audit fatigue
The growing number of audits for security and privacy regulatory compliance is stressing security personnel and draining resources from security operations. Here's how to better manage them.

6 board of directors security concerns every CISO should be prepared to address
The COVID pandemic and spike in cybercriminal activity has raised interest in security among corporate boards. These are the concerns and questions CISOs say they are now hearing from them.

5 best practices for negotiating SaaS contracts for risk and security
Software-as-a-service providers often handle your sensitive data. Here's how to hold them to a high standard for security.

Content fraud takes a bite out of brand reputation
Scammers leverage user-generated content on trusted sites to trick consumers into sharing sensitive data, causing financial and reputational harm to those businesses.

How drones affect your threat model
As use of unmanned aerial vehicles grows, organizations should have a plan for managing the risk associated with drones, whether or not they deploy them, experts say.

Redefining the CISO role: Why the top security job is gaining C-suite and boardroom status
Breach concerns, data privacy regulations, and a move to separate security from IT are elevating the importance of the security role.

4 ways edge computing changes your threat model
Edge computing provides more opportunities for attackers to access devices--and your network--remotely and physically. These are the risks you need to consider.

How IoT changes your threat model: 4 key considerations
More IoT devices connected to your network increases your attack surface, lowers visibility to potential threats, and requires greater coordination between IT and OT.

4 ways 5G will change your enterprise threat model
The benefits that fifth-generation cellular networks will enable come with security risks that organizations need to pay attention to right now.

Flex streamlines app access for 20k suppliers with IAM overhaul
Contract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property.

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security
Information Sharing and Analysis Organizations were created to make cyber threat data and best practices more accessible than with Information Sharing and Analysis Centers, but results are mixed.

Top 8 security mistakes in SAP environments
The complexity of modern SAP footprints and common security failures have left many organizations exposed to avoidable risks.

Why GE consolidated its identity and access management infrastructure
A multi-year effort to centralize GE's IAM functionality has resulted in significant cost savings, improved onboarding and better ability to meet regulatory requirements.

How Akamai implemented a zero-trust model
An effort that was triggered by a nation-state attack nine years ago has fundamentally transformed how people and devices access apps and services, limiting damage from lateral movement.

6 secrets to CISO job longevity
Business focus and communication are key, say long-serving chief security officers.

10 essential enterprise security tools (and 11 nice-to-haves)
Do you have the right tools to handle a changing threat landscape, tougher regulatory climate, and increasing IT infrastructure complexity? Here are the must-have security tools for meeting today's challenges.

5 steps to create a zero trust security model
A clear plan and willingness to change are critical to successfully moving to a zero trust environment.

What is an RDP attack? 7 tips for mitigating your exposure
Microsoft's Remote Desktop Protocol has become a popular attack vector. Here's what you need to know about the threat.

What it takes to build a zero trust network
Zero trust networks offer better protection against data breaches, but the road to them can be arduous.