James A. Martin

James A. Martin is a seasoned tech journalist and blogger based in San Francisco and winner of the 2014 ASBPE National Gold award for his CIO.com blog. He writes CIO.com's Living the Tech Life blog and is also a content marketing consultant.

23 DevSecOps tools for baking security into the development process

The password hall of shame (and 10 tips for better password security)

The password hall of shame (and 10 tips for better password security)

Banish these common passwords now and employ these tips for better password security.

IT Salary Survey: Do tech certifications pay off?

IT Salary Survey: Do tech certifications pay off?

In our recent survey, we asked IT professionals if certifications helped them land a job, earn a promotion or get a pay raise, and which certifications they’re planning to pursue. Here’s what we learned.

Best Android antivirus? The top 8 tools

Best Android antivirus? The top 8 tools

There are plenty of antivirus tools for Android. Here's how the top 8 measure up in protection, usability and features.

7 mobile security threats that may catch you by surprise

7 mobile security threats that may catch you by surprise

Even if you're usually savvy about cybersecurity, anyone can have a vulnerable moment. In our writer's case, it was his mother's funeral.

7 cloud security controls you should be using

7 cloud security controls you should be using

Human error is one of the top reasons for data breaches in the cloud, as administrators forget to turn on basic security controls. Whether it is Amazon Web Services, Microsoft Azure, or Google Cloud Platform, keep these rules in mind...

What is access control? A key component of data security

What is access control? A key component of data security

Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. It is a vital aspect of data security, but it has some significant enforcement challenges.

Developing personal OPSEC plans: 10 tips for protecting high-value targets

Developing personal OPSEC plans: 10 tips for protecting high-value targets

Attackers are increasingly targeting executives and employees who have access to sensitive enterprise data. Here's how to protect those individuals with personal OPSEC plans.

Top 10 global cybersecurity hubs for 2019

Top 10 global cybersecurity hubs for 2019

Many cities and regions are vying for the title of Cybersecurity Capital. Here are 10 of the leading and emerging contenders.

What is shadow IoT? How to mitigate the risk

What is shadow IoT? How to mitigate the risk

When someone in your organization starts using internet-connected devices without IT’s knowledge, that’s shadow IoT. Here's what you need to know about its growing risk.

5 things to know about fitness trackers and security in 2018

5 things to know about fitness trackers and security in 2018

Activity trackers, including dedicated fitness trackers and smartwatches, can expose enterprise networks if not properly managed and connected.

7 things your IT disaster recovery plan should cover

7 things your IT disaster recovery plan should cover

Enterprise networks and data access can be knocked out without warning, thanks to natural and man-made disasters. You can’t stop them all from happening, of course, but with a good disaster recovery plan you can be better prepared for...

Load More