Jaikumar Vijayan

Jaikumar Vijayan is a freelance technology writer specializing in computer security and privacy topics. Disclosure: He also writes for Hewlett-Packard's marketing website TechBeacon.

4 ways employee home networks and smart devices change your threat model

4 ways employee home networks and smart devices change your threat model

Home routers, printers, security systems, DVRs, gaming consoles and other smart devices can significantly change the threat model for the corporate network.

Redefining the CISO role: Why the top security job is gaining C-suite and boardroom status

Redefining the CISO role: Why the top security job is gaining C-suite and boardroom status

Breach concerns, data privacy regulations, and a move to separate security from IT are elevating the importance of the security role.

4 ways edge computing changes your threat model

4 ways edge computing changes your threat model

Edge computing provides more opportunities for attackers to access devices--and your network--remotely and physically. These are the risks you need to consider.

How IoT changes your threat model: 4 key considerations

How IoT changes your threat model: 4 key considerations

More IoT devices connected to your network increases your attack surface, lowers visibility to potential threats, and requires greater coordination between IT and OT.

4 ways 5G will change your enterprise threat model

4 ways 5G will change your enterprise threat model

The benefits that fifth-generation cellular networks will enable come with security risks that organizations need to pay attention to right now.

Flex streamlines app access for 20k suppliers with IAM overhaul

Flex streamlines app access for 20k suppliers with IAM overhaul

Contract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property.

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

Information Sharing and Analysis Organizations were created to make cyber threat data and best practices more accessible than with Information Sharing and Analysis Centers, but results are mixed.

Top 8 security mistakes in SAP environments

Top 8 security mistakes in SAP environments

The complexity of modern SAP footprints and common security failures have left many organizations exposed to avoidable risks.

Why GE consolidated its identity and access management infrastructure

Why GE consolidated its identity and access management infrastructure

A multi-year effort to centralize GE's IAM functionality has resulted in significant cost savings, improved onboarding and better ability to meet regulatory requirements.

How Akamai implemented a zero-trust model

How Akamai implemented a zero-trust model

An effort that was triggered by a nation-state attack nine years ago has fundamentally transformed how people and devices access apps and services, limiting damage from lateral movement.

6 secrets to CISO job longevity

6 secrets to CISO job longevity

Business focus and communication are key, say long-serving chief security officers.

10 essential enterprise security tools (and 11 nice-to-haves)

10 essential enterprise security tools (and 11 nice-to-haves)

Do you have the right tools to handle a changing threat landscape, tougher regulatory climate, and increasing IT infrastructure complexity? Here are the must-have security tools for meeting today's challenges.

5 steps to create a zero trust security model

5 steps to create a zero trust security model

A clear plan and willingness to change are critical to successfully moving to a zero trust environment.

What is an RDP attack? 7 tips for mitigating your exposure

What is an RDP attack? 7 tips for mitigating your exposure

Microsoft's Remote Desktop Protocol has become a popular attack vector. Here's what you need to know about the threat.

What it takes to build a zero trust network

What it takes to build a zero trust network

Zero trust networks offer better protection against data breaches, but the road to them can be arduous.

8 questions to ask about your industrial control systems security

8 questions to ask about your industrial control systems security

Do you have a real cybersecurity-focused ICS strategy in place, or are you force-fitting IT security policies on your industrial control systems?

7 threat modeling mistakes you’re probably making

7 threat modeling mistakes you’re probably making

Threat modeling is a process for identifying and addressing security risks, but the relative lack of maturity around the practice can cause big problems for organizations seeking to adopt it.

IRS makes tax refund scams harder but W-2 phishing attacks continue unabated

IRS makes tax refund scams harder but W-2 phishing attacks continue unabated

Anti-fraud measures by the Internal Revenue Service (IRS) and state agencies over the past two years have made tax refund scams harder for cyber criminals to pull off even as attacks targeting taxpayer information continue unabated.

Tips for negotiating with cyber extortionists

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need to have a plan for negotiating with people who take their data hostage.

5 tips for better enterprise security

5 tips for better enterprise security

Do your security policies and procedures actually promote better security, or is your company only looking for known malware and ignoring the human factor? It’s a tricky balancing act that trips up many organizations.

Load More